Threat Agent Library Helps Identify Information Security Risks

Our Intel IT Threat Assessment Group developed a unique, standardized threat agent library (TAL) that provides a consistent, up-to-date reference describing the human agents that pose threats to IT systems and other information assets. The TAL quickly helps risk management professionals (called risk managers in this paper) identify relevant threat agents and understand the importance of the threats. Threat information has historically been fragmented and sensationalized, with a lack of standard agent definitions. This made it difficult for risk managers to quickly and consistently assess risks from specific agents.

Spotlight

True North Networks

True North Networks is a managed service and private cloud hosting provider based in Swanzey, NH with additional offices in Concord, NH, Saco ME, and Pittsburgh, PA. Serving clients all across the country since 2002 and specializing in servicing the RIA industry for over 15 years, we work with companies to put enterprise level IT solutions within your reach so you can focus on moving your business forward. From backup solutions to vulnerability scans, around the clock monitoring of your systems to data recovery, True North Networks will be your IT company you can trust with a promise of IT support well above your expectations.

OTHER WHITEPAPERS
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Fortinet Security Fabric Enables Digital Innovation

whitePaper | February 5, 2020

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations. With this evolving infrastructure also come security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired DI outcomes while effectively managing risks and minimizing complexities, organizations need to adopt a cybersecurity platform that provides visibility across their environment and a means to manage both security and network operations easily.

Read More
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More

Spotlight

True North Networks

True North Networks is a managed service and private cloud hosting provider based in Swanzey, NH with additional offices in Concord, NH, Saco ME, and Pittsburgh, PA. Serving clients all across the country since 2002 and specializing in servicing the RIA industry for over 15 years, we work with companies to put enterprise level IT solutions within your reach so you can focus on moving your business forward. From backup solutions to vulnerability scans, around the clock monitoring of your systems to data recovery, True North Networks will be your IT company you can trust with a promise of IT support well above your expectations.

Events