Detecting Advanced Threats and Evasive Malware with Symantec Cynic

Threat actors have access to malware development tools that make it cheap and easy to develop customized targeted malware that is undetectable by traditional security systems. These same tools also include features which enable malware to become undetectable by the most popular sandbox products, such that with the check of a box, your investment in advanced threat detection becomes worthless, and the bad guys breach your network.

Spotlight

Sensify Security

Sensify Security is a Palo Alto-based IoT security startup that builds higher resistance to cyber-weapons by enabling operators to enforce access control in a decentralized manner within their operating environments. Its tamper-resistant propagation of security services to gateway-based points of enforcement offers operators centralized control, policy management, and compliance. Industrial and commercial operations are becoming increasingly connected and interconnected resulting in major security challenges and requiring a fundamental paradigm shift in security service delivery. Centralized service delivery solutions do not do enough. Sensify delivers security services to the Edge of Industrial and commercial operations using an innovative and decentralized model.

OTHER WHITEPAPERS
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More

Spotlight

Sensify Security

Sensify Security is a Palo Alto-based IoT security startup that builds higher resistance to cyber-weapons by enabling operators to enforce access control in a decentralized manner within their operating environments. Its tamper-resistant propagation of security services to gateway-based points of enforcement offers operators centralized control, policy management, and compliance. Industrial and commercial operations are becoming increasingly connected and interconnected resulting in major security challenges and requiring a fundamental paradigm shift in security service delivery. Centralized service delivery solutions do not do enough. Sensify delivers security services to the Edge of Industrial and commercial operations using an innovative and decentralized model.

Events