Boston Properties - A Study in Defeating Unknown Malware

"For Boston Properties, the network is more than just a communications tool. It’s the nervous system responsible for all of the firm’s property development and management systems from coast to coast. The Boston Properties network hosts everything from construction specifications and bid documents to outdoor lighting systems and video cameras. All requiring segmented systems and endpoints, elevated monitoring capabilities, and better limits on remote access. With so many important assets on its network, this need drove the firm to strengthen security across the entire enterprise. “Security became a higher priority driven by several incidents within the environment, e.g., well-designed phishing attacks against the management team and the obvious press coverage of major compromises,” says Rich Peirce, Director of Infrastructure Services at Boston Properties. “Our security strategy and planning was already well underway, but these factors elevated the conversation and attention.”

Spotlight

Clarified Networks

Clarified Networks is now a part of Codenomicon Group. Codenomicon Oy is known for its innovative products and services that secure network equipment, software, complex systems and critical infrastructure against unknown vulnerabilities and rapidly changing threats. Clarified Networks Oy, a fully owned Subsidiary of Codenomicon Oy, is a pioneer in collaborative analysis, reporting and visualization of events related to abuse, incident and critical infrastructure.Clarified Networks provides tools and services for collaborative analysis and visualization of complex events and systems. Our first commercial tool Clarified Analyzer was born in 2002 to meet the demand for system discovery based on real traffic. Our early application scenarios were in traffic audits and reverse engineering of complex ICT services.

OTHER WHITEPAPERS
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More

Spotlight

Clarified Networks

Clarified Networks is now a part of Codenomicon Group. Codenomicon Oy is known for its innovative products and services that secure network equipment, software, complex systems and critical infrastructure against unknown vulnerabilities and rapidly changing threats. Clarified Networks Oy, a fully owned Subsidiary of Codenomicon Oy, is a pioneer in collaborative analysis, reporting and visualization of events related to abuse, incident and critical infrastructure.Clarified Networks provides tools and services for collaborative analysis and visualization of complex events and systems. Our first commercial tool Clarified Analyzer was born in 2002 to meet the demand for system discovery based on real traffic. Our early application scenarios were in traffic audits and reverse engineering of complex ICT services.

Events