Cyberscurity

Using Threat Intelligence to Get the Upper Hand on Cybercriminals

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 20:17

Understanding your adversaries' tools, techniques, and processes (TTPs) that they're likely to weaponize is the best way to anticipate and combat threats. This whitepaper shares research on the latest attacker tools, provides architecture recommendations for organizations looking to strengthen security controls, and helps analysts use threat intelligence to more quickly and effectively identify threat trends.

Download this whitepaper now and learn how to:

Understanding Social Engineering

Submitted by gdsavvy@grantd… on Tue, 11/15/2016 - 19:55

The title of the new book is Understanding Social Engineering Based Schemes. And its mission is three-fold, Jakobsson says. He wants to profile today's most common schemes, forecast some future trends, and help organizations build effective countermeasures.

In an interview about the contents of his new book, Jakobsson discusses:

  • The evolution of socially engineered schemes;
  • Why these scams are still so successful;
  • Technology solutions that can help detect and deter the scammers.