• 17 de julio de 2013
    Enterprises are moving towards virtualization and cloud computing. However, adopting these new platforms opens new windows of exposure that can be leveraged in data breach attacks.
  • 03 de julio de 2013
    Knowing what they're losing may be a company's final lifeline against targeted attacks. Once a network's been compromised and attackers have started taking the data they need, it's only a matter of time before they do something drastic.
  • 02 de julio de 2013
    A rundown of basic configuration considerations that can improve ICS/SCADA systems security
  • 24 de mayo de 2013
    Whether considered advanced persistent threats (APTs) or malware-based espionage attacks, successful and long-term compromises of high-value organizations and enterprises worldwide by a consistent set of campaigns cannot be ignored.
  • 15 de marzo de 2013
    This research paper illustrates who¡¯s really attacking Internet-facing ICS/SCADA systems and why. It also covers techniques to secure ICS/SCADA systems and some best practices to do so.
  • 15 de marzo de 2013
    Research on Internet-facing ICS/SCADA systems, who¡¯s really attacking them, and why.
  • 21 de febrero de 2013
    So you've been hit by a targeted attack. The problem? You don't even know it yet. Targeted attacks continue to thrive within a system via hidden modes of communication. The faster a company catches these exchanges, the faster they are to stop.
  • 21 de febrero de 2013
    Once inside a network, targeted attacks can use it as a highway to further a campaign. By using network traffic, coupled with threat intelligence, enterprise response teams can monitor and stop attacks before their respective attackers get away with their goal
  • 15 de febrero de 2013
    Stealth gives an attacker the ultimate advantage against his targets. Once successfully placed inside his victim¡¯s network, an attacker¡¯s tools become his eyes and ears, which he can use to send and receive information that will further his campaign.