The Mechanics Behind a Decade Long Cyber Espionage Operation

FireEye just released a report called "APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION" .The report focuses on a targeted threat group that we call APT30 (Advanced Persistent Threat group 30) and details how a cyber-threat group exploited Governments and commercial entities across India and Southeast Asia for over a decade.

Spotlight

ACW Distribution Phils., Inc

ACW Distribution Phils., Inc. is a value-added IT Distribution company. We represent best-of-breed solutions that provide value to our SMB and Enterprise customers. Our product portfolio addresses the key issues affecting most businesses today - integration, security, scalability, availability, compliance, business intelligence, and control.

OTHER WHITEPAPERS
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

The Definitive WFH Security Checklist: 10 Easy Steps to Safer Remote Access

whitePaper | September 15, 2022

Providing secure, fast remote access is a top priority as the modern workforce has become predominantly remote. Working from home (WFH) or outside the office was once a choice or a stopgap measure, but today, it’s critical for business agility.

Read More
news image

Awesome Cyber Security Facts - Infographic

whitePaper | November 15, 2019

Check out our "Awesome Cyber Security Facts" infographic below to see how crucial cyber security attack was for some businesses, what are our main weaknesses in terms of personal cyber security and even more.

Read More
news image

Prevent Advanced Insider Threats With IBM Security Solutions

whitePaper | October 22, 2021

Are you confident that only the right people are getting access to your sensitive business assets? Organizations have to be concerned about privileged insiders compromising security and about outsiders posing as authorized users but who really aren't. Putting effective defenses into place, as a result, requires organizations to look both ways.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More

Spotlight

ACW Distribution Phils., Inc

ACW Distribution Phils., Inc. is a value-added IT Distribution company. We represent best-of-breed solutions that provide value to our SMB and Enterprise customers. Our product portfolio addresses the key issues affecting most businesses today - integration, security, scalability, availability, compliance, business intelligence, and control.

Events