Finding Alerts that Lead to Compromise

With every new layer of cyber security you put in place, the attackers respond by evolving their own tools and techniques. To combat this constantly changing threat you, too, need a new approach: FireEye as a Service.

Spotlight

ITAC SA

ITAC is a 100% Colombian company, Manufacturer of Security Solutions and SOA of the highest quality; Provider of IT Consulting Services and recognized Secure Software Factory, valued at CMMI Level 3. Has experience in various sectors of the economy, with success stories in more than 8 countries throughout the Americas, working with some Of the most important companies in the region. ITAC is recognized as an expert in specialized consulting to prevent security, architecture and application performance problems through quality assurance throughout the Software Development Lifecycle, development of solutions for secure information exchange and Factory of software. It has a committed and constantly updated work team in the latest technological trends, professional experts with exceptional skills and ingenuity, supported by a standardized, automated and valued development process at CMMI level 3, for the creation of highly effective solutions. They have 75 industry certifications on Java te

OTHER WHITEPAPERS
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More

Spotlight

ITAC SA

ITAC is a 100% Colombian company, Manufacturer of Security Solutions and SOA of the highest quality; Provider of IT Consulting Services and recognized Secure Software Factory, valued at CMMI Level 3. Has experience in various sectors of the economy, with success stories in more than 8 countries throughout the Americas, working with some Of the most important companies in the region. ITAC is recognized as an expert in specialized consulting to prevent security, architecture and application performance problems through quality assurance throughout the Software Development Lifecycle, development of solutions for secure information exchange and Factory of software. It has a committed and constantly updated work team in the latest technological trends, professional experts with exceptional skills and ingenuity, supported by a standardized, automated and valued development process at CMMI level 3, for the creation of highly effective solutions. They have 75 industry certifications on Java te

Events