Intrusion detection News
July 13, 2017
Researchers found changes in malware behavior when Petya detected certain security products, but experts are unsure why these features might exist.
June 29, 2017
Ransomware attacks have grown to such a scale, companies are getting attacked more than once. Endpoint data protection vendor Druva recently surveyed 832 IT professionals worldwide during May and ...
May 16, 2017
WannaCry and other ransomware attacks can be thwarted, but it takes proper data protection practices beforehand, as well as close monitoring of your data.
May 07, 2017
Keeping anything safe and secure involves multiple considerations. Avoid putting yourself in danger, put up a protective ‘shield’, detect when that is compromised, take mitigating action. When it ...
Intrusion detection Get Started
Bring yourself up to speed with our introductory content
The emergence of threat hunting programs underscores the importance of the human factor in fighting the most dangerous and costly security threats. Continue Reading
Advances in machine learning technology and artificial intelligence have proven to work well for some information security tasks such as malware detection. What's coming next? Continue Reading
As ransomware attacks continue to escalate, should organizations make employees an integral part of their ransomware detection and prevention strategy? Continue Reading
Evaluate Intrusion detection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As ransomware attackers get smarter, it's important for data protection systems to step up their game. Canary files and infection detection are a good start. Continue Reading
In this excerpt from chapter Z of Information Security Analytics, authors Mark Ryan Talabis, Robert McPherson, Inez Miyamoto and Jason L. Martin discuss security intelligence. Continue Reading
See how security analytics tools can work for businesses looking for more from their security software, and what security analytics tools are right for certain business scenarios. Continue Reading
Manage Intrusion detection
Learn to apply best practices and optimize your operations.
A cloud-era shadow IT policy still needs to manage risk, but the era of "no way" is giving way to allow users quick access to the productivity apps they need. Continue Reading
The fraud investigation process remains complicated for companies, but graph databases' information management techniques can help collect and manage valuable evidentiary data. Continue Reading
Almost 20 years after Citicorp decided to hire an executive-level security position dedicated to protecting its banking business, the responsibilities of the CISO job are still unclear to many business executives and open to discussion. Why do some companies still need convincing?
As threats and infrastructure evolve at a fast pace, chief information security officers have to remain proactive in the face of ongoing digitization and globalization. In this issue of Information Security magazine, we look at the role's elevation and influence on broader security and risk management initiatives. Most importantly, we highlight accomplishments of dedicated chief security officers from different industries -- entertainment, financial services, healthcare, retail and technology -- and get their views on challenges in the CISO job and changes ahead.
"The CISO has evolved from a technical security role to that of a corporate executive with a risk management focus," says Tim Callahan, senior vice president of global security and CISO at Aflac.
Strategic security is an increasing responsibility of the CISO job. A growing number of security officers have implemented a threat intelligence capability to help steer the technical aspects of their security program. We talk to CISOs and other security experts about some lessons they've learned -- sometimes the hard way -- as they lead these efforts. The CISO job is tough, but those who are up to the challenge find great rewards.Continue Reading
Problem Solve Intrusion detection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Preinstalled malware was reportedly found by Apple in its custom servers. Expert Nick Lewis explains how enterprises can protect themselves from encountering similar issues. Continue Reading
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis explains how it works. Continue Reading
Exaspy spyware, which can access messages, video chats and more, was found on Android devices owned by executives. Expert Nick Lewis explains how Exaspy is able to avoid detection. Continue Reading