Automated Malware Analysis: A Solution for IT Enterprise Security

While many enterprise IT organizations believe that they already have effective solutions in place for preventing malware from invading corporate networks, the traditional defensive approaches currently in use today may actually pose a significant source of risk. Malware analysis can help mitigate this risk if implemented as part of a comprehensive defensive strategy based on the premise that no preventive solutions are fully effective against advanced modern malware attacks.

Spotlight

Sylint Group

Sylint provides Expert services in Digital Data Forensics, eDiscovery and Cyber Security to a wide variety of clients, from small firms to fortune 100 companies. Our services cover both pre- and post-incident support, and address a broad range of regulations and requirements including PCI, Sarbanes-Oxley, HIPAA and ISO 27001. Our engineering team develops unique techniques and methods, through software and hardware, to detect and respond to newly emerging security threats, anti-forensic activities and fraudulent behaviors. Sylint's professionals combine experience from law enforcement and intelligence sectors with advanced technologies to provide unparalleled solutions for our clients. Specialties Cyber Security, Forensics, eDiscovery.

OTHER WHITEPAPERS
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

The State of ICS/OT Cybersecurity in 2022 and Beyond

whitePaper | October 26, 2022

The industrial control system (ICS)/operational technology (OT) security community is seeing attacks that go beyond traditional attacks on enterprise networks. Given the impacts to ICS/OT, fighting these attacks requires a different set of security skills, technologies, processes, and methods to manage the different risks and risk surfaces, setting ICS apart from traditional IT enterprise networks.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More

Spotlight

Sylint Group

Sylint provides Expert services in Digital Data Forensics, eDiscovery and Cyber Security to a wide variety of clients, from small firms to fortune 100 companies. Our services cover both pre- and post-incident support, and address a broad range of regulations and requirements including PCI, Sarbanes-Oxley, HIPAA and ISO 27001. Our engineering team develops unique techniques and methods, through software and hardware, to detect and respond to newly emerging security threats, anti-forensic activities and fraudulent behaviors. Sylint's professionals combine experience from law enforcement and intelligence sectors with advanced technologies to provide unparalleled solutions for our clients. Specialties Cyber Security, Forensics, eDiscovery.

Events