<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Sat, 07 Mar 2026 16:51:26 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchsecurity</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;Cybersecurity teams must be mindful at all times of the current threats their organization faces. While it's impossible to thwart every threat, stopping as many as possible and quickly detecting when they occur are both critical for reducing damage.&lt;/p&gt; 
&lt;p&gt;It is important to note that many cybersecurity incidents involve multiple types of threats. In a nutshell, a&amp;nbsp;&lt;i&gt;security threat&lt;/i&gt;&amp;nbsp;is a malicious act that aims to corrupt or steal data or disrupt an organization's systems or the entire organization. A&amp;nbsp;&lt;i&gt;security event&lt;/i&gt;&amp;nbsp;refers to an occurrence during which company data or its network might have been exposed. An event that results in a data or network breach is called a&amp;nbsp;&lt;i&gt;security incident&lt;/i&gt;.&lt;/p&gt; 
&lt;p&gt;Here are 10 types of threats that cybersecurity teams should focus on.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Supply chain attacks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Supply chain attacks&lt;/h2&gt;
 &lt;p&gt;Supply chain attacks are challenging to identify because they usually involve a breach or other cybersecurity compromise affecting a trusted third party, such as a supplier, partner, contractor, vendor or service provider. In this attack, the third party does not realize it has been compromised and therefore spreads the threat to its customers, partners and vendors.&lt;/p&gt;
 &lt;p&gt;For example, a vendor's software might accidentally be infected with malware during manufacturing, or bad actors might add malicious code that steals sensitive data from organizations using a service provider's offering. Another form of supply chain attack involves counterfeit products and legitimate products that have been tampered with after manufacturing and packaging.&lt;/p&gt;
 &lt;h3&gt;How to prevent supply chain attacks&lt;/h3&gt;
 &lt;p&gt;To prevent supply chain attacks, only work with trusted third-party vendors, service providers, partners and contractors. Perform &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-build-an-effective-third-party-risk-assessment-framework"&gt;third-party risk assessments&lt;/a&gt;, conduct continuous vendor monitoring and keep an accurate inventory of all third parties and their dependencies.&lt;/p&gt;
 &lt;p&gt;In addition, only purchase technology products and services from reputable manufacturers and vendors. Examine any physical technology purchases for anything suspicious, especially on product packaging or the product surface itself.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="2. Distributed denial-of-service attacks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Distributed denial-of-service attacks&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchsecurity/definition/distributed-denial-of-service-attack"&gt;DDoS&lt;/a&gt; attacks occur when thousands or millions of compromised devices simultaneously overwhelm a server, network or other target. The compromised devices are typically part of a botnet, enabling attackers to easily coordinate all devices in performing DDoS attacks. The goal of a DDoS attack is to disrupt the target's operations, preventing legitimate use of resources.&lt;/p&gt;
 &lt;h3&gt;How to prevent DDoS attacks&lt;/h3&gt;
 &lt;p&gt;Preventing DDoS attacks is a unique challenge. No matter how much capacity enterprise systems and networks have, a large DDoS attack can still clog them.&lt;/p&gt;
 &lt;p&gt;Options for mitigating DDoS attacks include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Partner with an MSP or other third party that specializes in DDoS attack monitoring and mitigation.&lt;/li&gt; 
  &lt;li&gt;Deploy and configure network security devices in front of systems and networks to &lt;a href="https://www.techtarget.com/searchsecurity/feature/Implement-API-rate-limiting-to-reduce-attack-surfaces"&gt;enforce rate limiting&lt;/a&gt; and stop traffic from known botnets.&lt;/li&gt; 
  &lt;li&gt;Design the organization's important applications with resilience in mind, such as duplicating key resources on other networks so that a DDoS attack against one network will not completely disrupt applications.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="3. Social engineering and phishing attacks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Social engineering and phishing attacks&lt;/h2&gt;
 &lt;p&gt;Social engineering comes in many forms, from someone pretending to be a delivery person in order to access a secure area to someone sending phishing emails, texts or other forms of messaging to deceive the recipient.&lt;/p&gt;
 &lt;p&gt;The goal of phishing, the most popular form of social engineering, is to get the recipient to divulge credentials, bank information or other sensitive data, or to install malware on the recipient's device.&lt;/p&gt;
 &lt;h3&gt;How to prevent social engineering and phishing attacks&lt;/h3&gt;
 &lt;p&gt;Some social engineering and phishing attacks can be stopped only by the intended victims. This requires that individual users be trained on &lt;a href="https://www.techtarget.com/searchsecurity/feature/How-to-avoid-phishing-hooks-A-checklist-for-your-end-users"&gt;how to identify attacks&lt;/a&gt; and what to do if an attack occurs. For example, they'll need to scrutinize links and email attachments for anything suspicious.&lt;/p&gt;
 &lt;p&gt;Many phishing attacks can be stopped through automated means, such as antispam and antimalware technologies, that are frequently updated with the latest threat intelligence. Some phishing attacks exploit software vulnerabilities, so keep all devices' software patched and up to date.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="4. Attacks through look-alike content"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Attacks through look-alike content&lt;/h2&gt;
 &lt;p&gt;Attackers often craft websites, social media accounts, advertisements and other online content to look just like the real thing. When visited, that content &lt;a href="https://www.techtarget.com/searchsecurity/tip/10-common-types-of-malware-attacks-and-how-to-prevent-them"&gt;installs malware on users' computers&lt;/a&gt;. Known as &lt;i&gt;drive-by download attacks&lt;/i&gt;, users have no idea that anything bad has happened.&lt;/p&gt;
 &lt;h3&gt;How to prevent attacks through look-alike content&lt;/h3&gt;
 &lt;p&gt;Educate users on how to verify that URLs, social media accounts and other content are legitimate to prevent these attacks. Tell users not to click on advertisements from work devices.&lt;/p&gt;
 &lt;p&gt;To stay on top of the latest threats, consider subscribing to near-real-time &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-open-source-and-commercial-threat-intelligence-feeds"&gt;threat intelligence feeds&lt;/a&gt;. These can be consumed by an organization's cybersecurity technologies to quickly stop access to look-alike content once others detect and report it. Organizations should also keep software patched and up to date to minimize the risk of malicious content exploiting vulnerabilities.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="5. Misinformation and disinformation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. Misinformation and disinformation&lt;/h2&gt;
 &lt;p&gt;Misinformation is incorrect information, while disinformation is intentional misinformation designed to trick people -- another form of social engineering. Whether information is accidentally or intentionally wrong, the effect is the same: it convinces people that false statements are true and often triggers them to act on those false statements.&lt;/p&gt;
 &lt;p&gt;Misinformation and disinformation come in many forms. AI technologies are &lt;a href="https://www.techtarget.com/searchsecurity/tip/Real-world-AI-voice-cloning-attack-A-red-teaming-case-study"&gt;now widely used to create deepfake audio and video&lt;/a&gt; that often can't be distinguished from the real thing. Websites, emails and other content might also provide false instructions to users on how to improve security or functionality on their work computers. Rumors about the organization itself could also surface inside or outside the business.&lt;/p&gt;
 &lt;h3&gt;How to prevent misinformation and disinformation&lt;/h3&gt;
 &lt;p&gt;Misinformation and disinformation are often difficult to detect through automated means. Instead, rely on regularly scheduled &lt;a href="https://www.techtarget.com/searchsecurity/definition/security-awareness-training"&gt;security awareness training&lt;/a&gt; to teach employees how to spot misinformation and disinformation. Educate them on how to verify information pertaining to both internal and external matters. Also, provide a website where members of the public can verify the legitimacy of communications they receive from the organization, and provide a mechanism for the public to report misinformation and disinformation involving the organization.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="6. Credential compromise and account takeover"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. Credential compromise and account takeover&lt;/h2&gt;
 &lt;p&gt;Passwords, ID badges and other credentials are obvious targets for attackers. Passwords can be acquired in many ways, including social engineering and phishing, watching someone enter a password on their phone, guessing a password -- known as &lt;i&gt;brute-force attacking&lt;/i&gt; -- or reusing a previously compromised password that the person used for multiple accounts.&lt;/p&gt;
 &lt;p&gt;Possessing a password enables an attacker, in many cases, to access and control the user account. This is known as an &lt;i&gt;account takeover&lt;/i&gt;.&lt;/p&gt;
 &lt;h3&gt;How to prevent credential compromise and account takeover&lt;/h3&gt;
 &lt;p&gt;Avoid relying only on passwords for user authentication. Requiring MFA and switching from passwords to &lt;a href="https://www.techtarget.com/searchsecurity/definition/passwordless-authentication"&gt;passwordless authentication&lt;/a&gt; are two effective alternatives. If passwords are required, teach employees &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-create-a-strong-passphrase-with-examples"&gt;how to create strong passphrases&lt;/a&gt;, which are a more secure alternative to passwords.&lt;/p&gt;
 &lt;p&gt;In addition, train users on how to safeguard their credentials and what to do if they think one of their credentials has been compromised. Another helpful measure is to use cybersecurity technologies that monitor authentication attempts. Use these tools to identify anomalies, such as the same user connecting to email from different geographic locations at the same time, which could indicate someone masquerading as the user.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="7. Ransomware"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7. Ransomware&lt;/h2&gt;
 &lt;p&gt;Ransomware uses encryption to make computers or files inaccessible or extortion to get victims to pay a ransom to get their stolen data back. While most ransomware attacks result from phishing or other forms of social engineering, some ransomware campaigns target exploitable software vulnerabilities.&lt;/p&gt;
 &lt;h3&gt;How to prevent ransomware&lt;/h3&gt;
 &lt;p&gt;Train users to avoid social engineering attacks, and teach them &lt;a href="https://www.techtarget.com/searchsecurity/tip/How-to-effectively-respond-to-a-ransomware-attack"&gt;what to do if a ransomware infection occurs&lt;/a&gt;. Seconds can make a difference between a single computer being infected and an infection spreading throughout an organization.&lt;/p&gt;
 &lt;p&gt;To minimize vulnerabilities that ransomware can exploit, organizations should keep all software current with the latest patches and updates. It's also critical to use antimalware technologies that detect and stop ransomware, along with cyberthreat intelligence feeds that provide near-real-time updates on the latest ransomware threats.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="8. Persistence threats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;8. Persistence threats&lt;/h2&gt;
 &lt;p&gt;Persistence refers to an attacker's ability to gain and then maintain access to a system without being detected. Known as &lt;i&gt;advanced persistent threats&lt;/i&gt; (&lt;a href="https://www.techtarget.com/searchsecurity/definition/advanced-persistent-threat-APT"&gt;APTs&lt;/a&gt;), attackers can persist unnoticed in compromised systems for days, weeks or months. During this time, they could access and exfiltrate sensitive data, compromise additional systems and monitor conditions until they are ready to launch a more devastating attack.&lt;/p&gt;
 &lt;h3&gt;How to prevent persistence&lt;/h3&gt;
 &lt;p&gt;Use firewalls and other network security tools, along with threat intelligence feeds, to block access to and from known malicious domains, IP addresses and websites. This denies APTs by disrupting the command-and-control channels they rely upon.&lt;/p&gt;
 &lt;p&gt;Monitor network traffic to look for signs of unauthorized access to internal systems. Use antimalware and antiphishing technologies to detect and stop attacks in transit. Also, scan the organization's devices regularly for signs of bots, exploit kits and other attack tools. Act swiftly whenever any such unauthorized tools are detected.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="9. Insider threats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;9. Insider threats&lt;/h2&gt;
 &lt;p&gt;An insider threat is when an employee, contractor or other person within an organization misuses their technology privileges in ways that violate and harm the organization's cybersecurity. For example, an employee emailing sensitive data to external email addresses for the purposes of selling the data. A more complex example is two employees in different roles colluding to steal from the organization.&lt;/p&gt;
 &lt;h3&gt;How to prevent insider threats&lt;/h3&gt;
 &lt;p&gt;Follow the &lt;a href="https://www.techtarget.com/searchsecurity/definition/principle-of-least-privilege-POLP"&gt;principle of least privilege&lt;/a&gt; to ensure each user has the minimal access needed to do their job. Train all users, including contractors and vendors, on acceptable use policies and the potential consequences of violating them. Monitor all user activity for signs of suspicious behavior. Promptly investigate potentially malicious behavior.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="10. Accidental data leaks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;10. Accidental data leaks&lt;/h2&gt;
 &lt;p&gt;Accidental data leaks occur when an organization's sensitive data is inadvertently made available to unauthorized parties or systems. Examples include choosing the wrong recipient for an email, uploading the wrong file to a website or shared storage, or posting data for public access that has not yet been approved for release.&lt;/p&gt;
 &lt;p&gt;Data leaks can also occur when old or broken technologies are disposed of without first sanitizing or physically destroying their data storage. Printouts are also mechanisms for data leaks.&lt;/p&gt;
 &lt;h3&gt;How to prevent accidental data leaks&lt;/h3&gt;
 &lt;p&gt;Teach users to double-check recipients, attachments and other components of emails and other messages before sending them. Use &lt;a href="https://www.techtarget.com/searchsecurity/tip/Top-7-data-loss-prevention-tools"&gt;data loss prevention technologies&lt;/a&gt; to examine outbound emails and other applications for potential signs of data leaks. Carefully control physical access to printed sensitive data so that printouts are not left unattended and are shredded when no longer needed.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Karen Kent is the co-founder of Trusted Cyber Annex. She provides cybersecurity research and publication services to organizations and was formerly a senior computer scientist for NIST.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Know thine enemy -- and the common security threats that can bring an unprepared organization to its knees. Learn what these threats are and how to prevent them.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a303249453.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-security-threats-for-IT-teams</link>
            <pubDate>Thu, 05 Feb 2026 09:00:00 GMT</pubDate>
            <title>10 types of information security threats for IT teams</title>
        </item>
        <item>
            <body>&lt;p&gt;Intrusion detection systems help enterprise cybersecurity teams monitor systems and workloads for suspicious activity. However, attackers can still penetrate networks and remain undetected for long periods using evasion techniques.&lt;/p&gt; 
&lt;p&gt;For more than two decades, &lt;a href="https://www.techtarget.com/searchsecurity/definition/intrusion-detection-system"&gt;IDSes&lt;/a&gt; have been a security must-have, helping identify anomalous activity and alerting admins of potential issues. Their later advancements, including automated actions, such as blocking suspicious network traffic, stopping malicious packets, and sending alerts and data to a SIEM or similar centralized platform, fortified their place in the security arsenal.&lt;/p&gt; 
&lt;p&gt;Yet malicious hackers have devised numerous ways to elude IDSes. Let's examine seven common IDS evasion techniques security teams should know about, as well as how to mitigate them.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Compromising trusted applications and infrastructure"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Compromising trusted applications and infrastructure&lt;/h2&gt;
 &lt;p&gt;End users tend to implicitly trust the applications they use and the infrastructure those applications run on. Attackers have developed techniques, such as &lt;a href="https://www.techtarget.com/searchsecurity/answer/How-can-I-detect-fileless-malware-attacks"&gt;fileless malware&lt;/a&gt;, to masquerade as trusted apps and services. Fileless malware lacks executable files, which makes it hard to detect. It is designed to take over and control trusted apps and services without the user noticing. The malware then installs keyloggers or Trojans and tries to steal login credentials. Because not all services and apps encrypt communications, attackers can easily insert malicious payloads to steal business-critical data.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="2. Obfuscation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Obfuscation&lt;/h2&gt;
 &lt;p&gt;Cyberattackers design malware to confuse network security tools and penetrate networks unnoticed. This is known as &lt;a href="https://www.techtarget.com/searchsecurity/definition/obfuscation"&gt;obfuscation&lt;/a&gt;. For example, organizations use encryption obfuscation to protect data from being read by bad actors. Attackers use obfuscation to render a file's data or signature indecipherable, remove identifying metadata, insert useless code or alter file names. Obfuscated, the malware's code might appear innocuous to an IDS or static analysis tool and be allowed to pass through a scan without being revealed as malicious.&lt;/p&gt;
 &lt;p&gt;The 2019 SolarWinds supply chain attack involved obfuscation. Attackers used it to bypass security measures and insert backdoors into the SolarWinds Orion platform. The obfuscation techniques included faking activity, deleting programs after use and altering audit logs.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="3. IP packet fragmentation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. IP packet fragmentation&lt;/h2&gt;
 &lt;p&gt;Packet fragmentation involves splitting packets into smaller fragments under the network's maximum size and reassembling them at their destination. While not necessarily a malicious process, attackers use packet fragmentation nefariously. For example, attackers know that IDSes often won't scan every network packet fragment because it expends a lot of computing and processing power. Attackers therefore send a slot of fragmented packets in hopes the IDS will not scan them, allowing the malicious code to bypass the security system altogether.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="4. Source routing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Source routing&lt;/h2&gt;
 &lt;p&gt;Source routing enables a sender to specify a packet's route through a network, rather than letting a router determine its path. Attackers use source routing maliciously by providing a specific destination that bypasses the IDS.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="5. Source port manipulation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. Source port manipulation&lt;/h2&gt;
 &lt;p&gt;IDSes and firewalls can be tricked into believing a file is going to a specific -- and often benign -- port rather than a legitimate one. Known as source port manipulation, this usually involves a port that is blocked from external traffic. For example, an attacker could make it appear the destination for their malware is port 80 -- primarily used for HTTP -- when the actual target port is normally not open to external traffic.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="6. IP address spoofing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;6. IP address spoofing&lt;/h2&gt;
 &lt;p&gt;IP address spoofing involves attackers altering the headers of their malicious data packets to appear to be from a legitimate host. The target system's IDS and firewall believe the data packets are from a legitimate source and, therefore do not filter the packets containing spoofed IP addresses.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="7. Creating specialized packets"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;7. Creating specialized packets&lt;/h2&gt;
 &lt;p&gt;Attackers can use packet crafting tools to create their own customized data packets that evade an IDS. The attackers append data to the payload or use Unicode -- special characters designed to represent various languages. The malware's pattern, disguised to trick a signature-based IDS, looks legitimate, which enables malicious payloads to reach the intended server.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="How to mitigate intrusion detection system evasion"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to mitigate intrusion detection system evasion&lt;/h2&gt;
 &lt;p&gt;Organizations should take the following steps to prevent and detect IDS evasion techniques:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Regular &lt;a href="https://www.techtarget.com/searchenterprisedesktop/definition/patch-management"&gt;patch management&lt;/a&gt; ensures IDS software and firmware are up to date.&lt;/li&gt; 
  &lt;li&gt;A centralized management system enables the IDS to alert security teams of issues in real time, resulting in faster security responses and reduced false positives.&lt;/li&gt; 
  &lt;li&gt;A &lt;a href="https://www.techtarget.com/searchsecurity/answer/What-are-the-cybersecurity-benefits-of-zero-trust"&gt;zero-trust framework&lt;/a&gt; segments a network into different zones, each with its own security controls and mechanisms, such as &lt;a href="https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA"&gt;MFA&lt;/a&gt;. This multilayer strategy helps reduce vulnerabilities and the attack surface.&lt;/li&gt; 
  &lt;li&gt;Advanced technologies, such as next-generation firewalls, enable security teams to create more customized and sophisticated data packet filtering rules.&lt;/li&gt; 
  &lt;li&gt;Remain vigilant and &lt;a href="https://www.techtarget.com/searchwindowsserver/tip/Microsoft-Teams-monitoring-tips-for-admins"&gt;report suspicious network activity&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;Ravi Das is a technical engineering writer for an IT services provider. He is also a cybersecurity consultant at his private practice, ML Tech, Inc., and has the Certified in Cybersecurity (CC) certification from ISC2.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Malicious attackers use various evasion tactics to infiltrate networks without intrusion detection systems noticing. Learn what these techniques are and how to mitigate them.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ransom_g688123960.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/tip/7-common-intrusion-detection-system-evasion-techniques</link>
            <pubDate>Tue, 15 Oct 2024 13:12:00 GMT</pubDate>
            <title>7 common intrusion detection system evasion techniques</title>
        </item>
        <item>
            <body>&lt;p&gt;Contact center fraud is a reality that organizations must prepare for or else risk considerable losses due to security lapses in &lt;a href="https://www.techtarget.com/searchdatabackup/definition/data-protection"&gt;customer data protection&lt;/a&gt;. Successful fraud schemes can damage a brand's reputation and result in compliance liability, especially in heavily regulated industries, such as financial services and healthcare.&lt;/p&gt; 
&lt;p&gt;Companies can mitigate their vulnerability to unauthorized access or disclosure of confidential information with the right blend of comprehensive agent training, well-documented authentication and data security processes, and &lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/contact-center"&gt;contact center&lt;/a&gt; fraud detection technologies.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is contact center fraud?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is contact center fraud?&lt;/h2&gt;
 &lt;p&gt;At many businesses, traditional call centers and customer service and support operations have &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/History-and-evolution-of-contact-centers"&gt;evolved into contact centers&lt;/a&gt; to handle customer communications across multiple channels, including phone calls, live chats, email, social media, text messaging (SMS), mobile apps and video calls.&lt;/p&gt;
 &lt;p&gt;Cybercriminals target contact centers to gain access to sensitive customer information by exploiting agents and weak authentication processes. These bad actors can then use personally identifiable information (&lt;a href="https://www.techtarget.com/searchsecurity/definition/personally-identifiable-information-PII"&gt;PII&lt;/a&gt;) and other account data -- Social Security numbers, financial institutions and credit card numbers -- to commit identity theft, set up fake accounts and participate in bank and credit card fraud.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Why do bad actors target contact centers?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why do bad actors target contact centers?&lt;/h2&gt;
 &lt;p&gt;Contact centers are popular targets for fraud because &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-agent-training-programs"&gt;poorly trained agents are often vulnerable to manipulation&lt;/a&gt;. A toll-free number used for customer service and transactions such as purchases can allow criminals to initiate numerous fraud attempts while maintaining anonymity, provided they use caller ID spoofing techniques. Unsuspecting agents, especially in call centers, make excellent attack vectors since they're all that stand between a fraudster and customer accounts.&lt;/p&gt;
 &lt;p&gt;The transition to hybrid work environments after the COVID-19 pandemic has created challenges for contact center fraud detection preparedness. Remote work has made it &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-manage-remote-call-center-agents"&gt;increasingly difficult for agents to receive proper fraud detection training&lt;/a&gt; or guidance from co-workers. As a result, they may struggle with using anti-fraud tools remotely.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f.png 1280w" alt="List of contact center compliance obligations that are critical to fraud detection and prevention." height="266" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;A compliance checklist is an essential part of detecting and preventing contact center fraud.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Common types of contact center fraud"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Common types of contact center fraud&lt;/h2&gt;
 &lt;p&gt;While contact centers encounter many types of fraud, the most common are identity theft, account takeover, stolen credit card information, vishing scams and finagling free merchandise.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Identity theft.&lt;/b&gt; Criminals use stolen personal information of legitimate customers to access accounts for monetary gain. Contact center agents might &lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/Nine-skills-every-call-center-agent-job-requires"&gt;struggle to detect identity theft&lt;/a&gt; because the bad actors have accurate customer information. Many fraud schemes use personal information found on the dark web after a data breach. Synthetic identity fraud occurs when criminals combine real PII, such as a mobile phone number and email address, with falsified data to create a manipulated or false identity. They then use the information to open accounts and initiate transactions.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Account takeover.&lt;/b&gt; To transfer a customer account to their account, fraudsters might change an email address or login information to reset customer portal passwords. These criminals can use automated tools to create username and password combinations in a technique known as credential stuffing to gain access to customer accounts.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Use of stolen credit card information.&lt;/b&gt; Fraudsters bombard contact centers with attempts to buy goods and services with stolen credit card information. Because contact centers don't require physical cards, criminals can more easily make purchases with stolen information, a tactic known as card-not-present fraud.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Attempt to receive free replacement items.&lt;/b&gt; Criminals act as legitimate customers who purchased goods, then claim to have problems and request replacements. Retailers are the most common victims of this type of fraud, especially those with &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Call-center-compliance-checklist-for-hybrid-workforces"&gt;loose warranty and replacement policies&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Phishing and vishing scams. &lt;/b&gt;Cybercriminals have long targeted consumers with phishing scams, sending fraudulent emails that contain malicious URLs or hyperlinks to download malware or steal passwords. Another tactic is &lt;i&gt;voice phishing&lt;/i&gt;, or &lt;i&gt;vishing&lt;/i&gt;, using urgent phone calls that demand victims to update company or personal data supposedly to protect bank accounts and other financial transactions. Similar fraudulent methods are used on contact center agents. A criminal vishing about problems with an account can &lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/5-ways-to-improve-call-center-agent-performance"&gt;dupe an unsuspecting agent into sharing sensitive customer data&lt;/a&gt;&lt;b&gt;. &lt;/b&gt;Many contact centers have been hit with ransomware attacks, locking up communications systems until the problem is resolved or the ransom is paid. Distributed denial-of-service attacks have also been used to disrupt communications services.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/SRKWbLNV4bs?si=Y1QV9QX4HFsHjaTB?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Tips for identifying fraudulent customers"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Tips for identifying fraudulent customers&lt;/h2&gt;
 &lt;p&gt;Criminals use different fraud methods depending on their motivation or the &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/Types-of-contact-centers-explained"&gt;type of contact center&lt;/a&gt; they target. Common warning signs of fraud include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Social engineering methods to falsely extract information.&lt;/li&gt; 
  &lt;li&gt;Inability to verify recent transactions.&lt;/li&gt; 
  &lt;li&gt;Long pauses before answering questions.&lt;/li&gt; 
  &lt;li&gt;Communication to evoke an immediate reaction based on urgency, familiarity or authority.&lt;/li&gt; 
  &lt;li&gt;Attempts to &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Top-7-call-center-agent-performance-metrics-to-track"&gt;establish a relationship or rapport with a specific contact center agent&lt;/a&gt; or manager.&lt;/li&gt; 
  &lt;li&gt;Inconsistency in customer history and documentation.&lt;/li&gt; 
  &lt;li&gt;Attempts to bypass regular customer service procedures.&lt;/li&gt; 
  &lt;li&gt;Red flags and suspicious activity identified by anti-fraud technologies.&lt;/li&gt; 
  &lt;li&gt;Attempts to bypass anti-fraud processes and technologies.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Tools to identify fraud"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Tools to identify fraud&lt;/h2&gt;
 &lt;p&gt;Enterprises that take contact center fraud detection and prevention seriously shouldn't rely solely on agent training. Contact center managers can integrate several technologies into most on-premises, cloud or distributed workforce contact centers to &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-contact-center-quality-assurance"&gt;block or flag suspicious activities&lt;/a&gt; and enhance fraud detection.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Identity verification. &lt;/b&gt;Technologies like automatic number identification can &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-improve-the-contact-center-experience-for-customers"&gt;verify a customer's identity&lt;/a&gt; based on their phone number ahead of automated or interactive voice response (&lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/Interactive-Voice-Response-IVR"&gt;IVR&lt;/a&gt;) interactions. Some of these fraud detection technologies track phone numbers based on information like possession (authenticating the mobile number and the device), reputation (risk score) and ownership. If additional verification is needed, layered authentication controls can help prevent fraud by sending one-time verification codes via text or email to a customer's device. In the future, individuals could have additional ways to prove their identity with mobile devices as more states offer digital driver's licenses and government IDs.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Contact source analytics. &lt;/b&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/How-to-choose-a-contact-center-software-system"&gt;Emerging technologies&lt;/a&gt; can more accurately confirm a contact's true source as well as the type of device used. These attributes can tip off contact center agents about whether the caller is a real customer or a criminal in a known fraud location or using equipment common among fraudsters, such as caller ID spoofing and IVR probing tools.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/ai_sharpens_contact_center_features_and_actions-f.png 1280w" alt="List of contact center tools benefiting from AI" height="355" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;AI integration plays a prominent role in contact center fraud detection and prevention tools.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;p&gt;&lt;b&gt;Multilayered authentication.&lt;/b&gt; Multifactor authentication, &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Top-10-contact-center-platforms"&gt;AI and knowledge-based platforms&lt;/a&gt; can identify bad actors who impersonate legitimate customers. The technology platform inputs various data points and calculates a fraud risk score to inform the agent about next steps in the fraud prevention process. A one-time pin or passcode sent by text or email to an individual's device can add a dynamic layer of security before a login session or transaction. Based on risk assessments, businesses must find the right balance between frictionless customer experience and layered security measures.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Voice biometrics.&lt;/b&gt; Advanced audio biometrics can analyze a caller's voice, creating a new authentication layer for contact centers and customers. Voice biometric SaaS providers let remote agents access these authentication services regardless of where they work. These technologies will soon have to contend with AI-driven voice cloning and deepfake audio, which might require reevaluation of fraud protection and other security measures.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Suspicious behavior detection.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/Important-contact-center-AI-features-and-their-benefits"&gt;AI and machine learning techniques&lt;/a&gt; combine with fraud detection analytics tools to detect suspicious behavior such as unusual calling patterns, IVR usage anomalies and other behavior-based indicators. The tool then decides whether the contact is legitimate. Behavioral analytics can also be used to monitor agent behavior for insider threats by flagging multiple account redirects or password resets.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt; &lt;i&gt;This article was updated to reflect the latest developments in contact center fraud detection and prevention tools, techniques and practices.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Kathleen Richards is a freelance journalist and industry veteran. She's a former features editor for TechTarget's &lt;/i&gt;Information Security &lt;i&gt;magazine.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Andrew Froehlich is founder of InfraMomentum, an enterprise IT research and analyst firm, and president of West Gate Networks, an IT consulting company. He has been involved in enterprise IT for more than 20 years.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Contact centers can be sitting ducks for fraudsters, but comprehensive agent training, authentication techniques and advanced technologies can protect businesses and customers.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/customer_service02.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/tip/How-to-train-agents-on-call-center-fraud-detection</link>
            <pubDate>Fri, 04 Oct 2024 11:02:00 GMT</pubDate>
            <title>Contact center fraud: How to detect and prevent it</title>
        </item>
        <item>
            <body>&lt;p&gt;DC Health Link's data breach was caused by a misconfigured server, according to a prepared statement by an executive for the health insurance exchange at a House Oversight Committee hearing on Wednesday.&lt;/p&gt; 
&lt;p&gt;DC Health Link, a health insurance exchange program based in Washington, D.C., &lt;a href="https://www.techtarget.com/searchsecurity/news/365532552/DC-Health-Link-confirms-breach-but-questions-remain"&gt;confirmed it suffered&lt;/a&gt; a data breach last month after a user on dark web hacking forum BreachForums offered to sell stolen data representing 170,000 individuals.&lt;/p&gt; 
&lt;p&gt;The user who originally posted the data, "IntelBroker," was permanently banned from BreachForums following the listing. However, on March 13, another user in apparent possession of the data under the alias "Denfur" claimed to be friends with IntelBroker and said the origin of the breach was an "open, exposed database."&lt;/p&gt; 
&lt;p&gt;On March 15, BreachForums' alleged founder &lt;a href="https://www.techtarget.com/searchsecurity/news/365532545/FBI-arrests-suspected-BreachForums-owner-in-New-York"&gt;was arrested&lt;/a&gt; in New York, and the forum was voluntarily shuttered days after due to law enforcement concerns. No definitive connection to DC Health Link was established.&lt;/p&gt; 
&lt;p&gt;Mila Kofman, executive director of the District of Columbia Health Benefit Exchange Authority, which operates the exchange, participated in a &lt;a href="https://www.youtube.com/watch?v=Ihw5wBp55Ug" target="_blank" rel="noopener"&gt;hearing on Wednesday&lt;/a&gt;. The hearing was held by the U.S. House Oversight and Accountability Subcommittee on Cybersecurity, Information Technology, and Government Innovation as well as the Committee on House Administration's Subcommittee on Oversight.&lt;/p&gt; 
&lt;p&gt;During her &lt;a href="https://oversight.house.gov/wp-content/uploads/2023/04/Mila-Kofman-Written-Testimony-April-19-2023.pdf" target="_blank" rel="noopener"&gt;opening statements&lt;/a&gt;, Kofman confirmed DC Health Link detected the breach on March 6 and that the cause of the breach was a misconfigured server.&lt;/p&gt; 
&lt;p&gt;"Let me be clear at the outset: The cause of this breach was human mistake," Kofman said. "With respect to the 'root cause' -- the problem here related to the configurations on a server used for generating and storing automated jobs and weekly reports. The server was misconfigured to allow access to the reports on the server without proper authentication. Based on our investigation to date, we believe the misconfiguration was not intentional but human mistake."&lt;/p&gt; 
&lt;p&gt;As part of the breach, the threat actor stole two "reports" representing sensitive data belonging to "56,415 current and past customers, including members of Congress, their families and staff," Kofman said. Among the victims were 17 House members, 43 of their dependents, 585 House staff members and 231 of their dependents. Personal information included names, dates of birth and social security numbers.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/mila_kofman_dc_health_benefit_exchange_authority-f.jpg"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/mila_kofman_dc_health_benefit_exchange_authority-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/mila_kofman_dc_health_benefit_exchange_authority-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/mila_kofman_dc_health_benefit_exchange_authority-f.jpg 1280w" alt="Mila Kofman, executive director of the District of Columbia Health Benefit Exchange Authority, speaks at a House Oversight Committee meeting Wednesday." data-credit="YouTube" height="315" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Mila Kofman, executive director of the District of Columbia Health Benefit Exchange Authority, apologized to members of Congress Wednesday for the 
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;p&gt;According to the exchange's &lt;a href="https://hbx.dc.gov/page/about-dc-health-benefit-exchange-authority-hbx" target="_blank" rel="noopener"&gt;website&lt;/a&gt;, approximately 100,000 individuals have private health insurance through the public-private exchange, including D.C.-area residents and "approximately 11,000 designated Congressional staff and members of Congress."&lt;/p&gt; 
&lt;p&gt;TechTarget Editorial asked DC Health Link about the discrepancy between the alleged 170,000-person listing and Kofman's 56,415 figure, but a spokesperson for the exchange declined to elaborate.&lt;/p&gt; 
&lt;p&gt;Kofman apologized directly to the committees during her opening remarks.&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   Let me be clear at the outset: The cause of this breach was human mistake.
  &lt;/figure&gt;
  &lt;figcaption&gt;
   &lt;strong&gt;Mila Kofman&lt;/strong&gt;Executive director, District of Columbia Health Benefit Exchange Authority
  &lt;/figcaption&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;p&gt;"In addition to saying how sorry I am that we failed to prevent the theft of two reports which had sensitive personal information of our customers, I want you to know that we have not and will not fail in our response. And we are working hard to make sure this never happens again," she said.&lt;/p&gt; 
&lt;p&gt;DC Health Link engaged incident response firm and Google subsidiary Mandiant as part of its investigation. Kofman added that the Health Benefit Exchange Authority also engaged the FBI Cyber Security Task Force shortly after the breach. It further briefed law enforcement, CISA, both the U.S. Senate and House of Representatives, and more.&lt;/p&gt; 
&lt;p&gt;"We asked law enforcement for help immediately and shared information as we uncovered it," she said. "Mandiant quickly worked alongside our team to identify the root cause of the breach, which we immediately eliminated. In addition to addressing this issue, we initiated a comprehensive review of our entire system and security, and we will be making enhancements across the board and can keep you updated on that progress."&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;Alexander Culafi is a writer, journalist and podcaster based in Boston.&lt;/i&gt;&lt;/p&gt;</body>
            <description>Mila Kofman, executive director of the District of Columbia Health Benefit Exchange Authority, blames "human error" for the DC Health Link breach.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/ransom_g1249114648.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/365535577/DC-Health-Link-breach-caused-by-misconfigured-server</link>
            <pubDate>Thu, 20 Apr 2023 10:02:00 GMT</pubDate>
            <title>DC Health Link breach caused by misconfigured server</title>
        </item>
        <item>
            <body>&lt;h3&gt;What is quantum supremacy?&lt;/h3&gt; 
&lt;p&gt;Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classical computers by performing calculations previously impossible at unmatched speeds. To confirm that quantum supremacy has been achieved, computer scientists must be able to show that a classical computer could never have solved the problem while also proving that the quantum computer can perform the calculation quickly.&lt;/p&gt; 
&lt;p&gt;Computer scientists believe &lt;a href="https://www.techtarget.com/searchitoperations/opinion/Quantum-supremacy-and-the-path-to-encryption-chaos"&gt;quantum supremacy will lead to the cracking&lt;/a&gt; of Shor's algorithm -- a currently impossible calculation that is the basis of most modern cryptography -- as well as offer advantages in drug development, weather forecasts, stock trades and material designs.&lt;/p&gt; 
&lt;p&gt;Quantum computing is consistently evolving. Quantum computers have not yet reached a point where they can show their supremacy over classical computers. This is mostly due to the huge amount of quantum &lt;a href="https://www.techtarget.com/whatis/definition/bit-binary-digit"&gt;bits&lt;/a&gt;, or &lt;i&gt;qubits&lt;/i&gt;, required to perform meaningful operations on quantum computers. As the amount of necessary logic gates and number of qubits increases, so does the error rate. If the error rate gets too high, the quantum computer loses any advantage it had over the classical computer.&lt;/p&gt; 
&lt;p&gt;To successfully perform useful calculations -- such as determining the chemical properties of a substance -- a few million qubits would be necessary. Currently, the largest quantum computer design is IBM's quantum computer, named Osprey, which &lt;a href="https://newsroom.ibm.com/2022-11-09-IBM-Unveils-400-Qubit-Plus-Quantum-Processor-and-Next-Generation-IBM-Quantum-System-Two" target="_blank" rel="noopener"&gt;features 433 qubits&lt;/a&gt;.&lt;/p&gt; 
&lt;h3&gt;Quantum computers vs. classical computers&lt;/h3&gt; 
&lt;p&gt;The primary difference between quantum and classical computers is in how they work. Classical computers process information as bits, with all computations performed in a &lt;a href="https://www.techtarget.com/whatis/definition/binary"&gt;binary&lt;/a&gt; language of 1s and 0s. The current in classical computers is either flowing through the transistor or not; there is no in between.&lt;/p&gt; 
&lt;p&gt;Conversely, quantum computers use &lt;a href="https://www.techtarget.com/whatis/definition/quantum-theory"&gt;quantum theory&lt;/a&gt; as the basis of their systems. Quantum theory focuses on the extraordinary interactions between particles on an invisible scale -- such as atoms, electrons and photons. Therefore, the binary states used in classical computers can no longer be applied to quantum computers.&lt;/p&gt; 
&lt;p&gt;Qubits can theoretically outperform the computation scale of binary bits by magnitudes. This is mostly due to quantum &lt;a href="https://www.techtarget.com/whatis/definition/superposition"&gt;superposition&lt;/a&gt; -- the ability for a subatomic particle to exist in two states at once. Superposition enables qubits to run specific computations on various possibilities simultaneously.&lt;/p&gt; 
&lt;p&gt;Trapped &lt;a href="https://www.techtarget.com/whatis/definition/ion"&gt;ions&lt;/a&gt;, photons and &lt;a href="https://www.techtarget.com/whatis/definition/superconductivity"&gt;superconductors&lt;/a&gt; give quantum computers the ability to perform calculations at exceptionally fast speeds and take in massive amounts of data. The real value that quantum computers could provide, however, is the ability to solve problems that are too complex for classical computers to address or that would take classical computers billions of years to answer. Quantum computers should be able to create a series of samples from a random quantum circuit that follow a specific, correct distribution.&lt;/p&gt; 
&lt;p&gt;While these advantages could lead to quantum supremacy, processors have not yet been built with all the capabilities. Classical computers continue to surprise computer scientists with computational power and their ability to solve certain types of problems. Until a quantum computer is built that solves a problem it has been proven a classical computer cannot solve, it continues to be possible that a better classical algorithm exists and quantum supremacy will not be achieved.&lt;/p&gt; 
&lt;h3&gt;Applications of quantum supremacy&lt;/h3&gt; 
&lt;p&gt;Some people believe a quantum computer that achieves quantum supremacy could be the most disruptive new technology since the Intel 4004 microprocessor was invented in 1971. Certain professions and areas of business will be significantly impacted by quantum supremacy. Examples include:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;The ability to perform more complex &lt;a href="https://www.techtarget.com/whatis/definition/modeling-and-simulation-MS"&gt;simulations&lt;/a&gt; on a larger scale will provide companies with improved efficiency, deeper insight and better forecasting, thus improving optimization processes.&lt;/li&gt; 
 &lt;li&gt;Enhanced simulations that model complex quantum systems, such as biological molecules, would be possible.&lt;/li&gt; 
 &lt;li&gt;Combining quantum computing with &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence"&gt;artificial intelligence&lt;/a&gt; could make AI immensely smarter than it is now.&lt;/li&gt; 
 &lt;li&gt;New customized drugs, chemicals and materials can be designed, modeled and modified to help cultivate new pharmaceutical, commercial or business products.&lt;/li&gt; 
 &lt;li&gt;The ability to factor extremely large numbers could break current, long-standing forms of &lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;encryption&lt;/a&gt;.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;While most of these applications appear to provide benefits, quantum supremacy can also destabilize the math that underlies most current data encryption. Once quantum supremacy is achieved, computer scientists will have to completely reevaluate computer security and how to protect information and data. This will become extremely difficult with the high speeds and large amounts of data that the quantum computers will be working with.&lt;/p&gt; 
&lt;h3&gt;Examples of quantum supremacy&lt;/h3&gt; 
&lt;p&gt;While the problem that first exemplifies quantum supremacy could be whatever computer scientists want, it is expected that they will use a problem known as &lt;a href="https://quantumcomputing.stackexchange.com/questions/4005/what-exactly-is-random-circuit-sampling" target="_blank" rel="noopener"&gt;random circuit sampling&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;This problem requires a computer to correctly sample from the possible outputs of a random quantum circuit -- similar to a series of actions that can be performed on a set of qubits. Classical computers do not possess any fast algorithms to generate these samples. As the array of possible samples increases, classical computers become overwhelmed. If a quantum computer can efficiently pull samples in this instance, it will prove quantum supremacy.&lt;/p&gt; 
&lt;h3&gt;Importance of quantum supremacy&lt;/h3&gt; 
&lt;p&gt;The first quantum &lt;a href="https://www.techtarget.com/whatis/definition/algorithm"&gt;algorithms&lt;/a&gt; were solved in the 1990s. While the problems themselves were useless, the process provided the computer scientists who designed them with knowledge and insights they could use to develop more meaningful algorithms -- like Shor's algorithm -- which could potentially have large practical consequences.&lt;/p&gt; 
&lt;p&gt;Computer scientists hope that quantum supremacy will repeat this process and drive inventors to create a quantum computer capable of outperforming a classical computer -- even if it only solves a simple, useless problem -- because this work could be the key to building a beneficial and supreme quantum computer.&lt;/p&gt; 
&lt;p&gt;Some people also believe &lt;a href="https://www.britannica.com/technology/Moores-law" target="_blank" rel="noopener"&gt;Moore's law&lt;/a&gt; is ending soon. This would inhibit AI research because smarter applications, such as fully &lt;a href="https://www.techtarget.com/searchenterpriseai/definition/driverless-car"&gt;autonomous cars&lt;/a&gt;, require huge amounts of processing power. Once quantum supremacy is reached, quantum computing should be able to resolve this problem, as well as revolutionize machine learning (&lt;a href="https://www.techtarget.com/searchenterpriseai/definition/machine-learning-ML"&gt;ML&lt;/a&gt;).&lt;/p&gt; 
&lt;p&gt;Quantum supremacy would greatly affect the field of theoretical computer science. For decades, scientists in this field have believed in the extended Church-Turing thesis, which states that classical computers can efficiently complete any problem that any other type of computer can accomplish. Quantum supremacy violates that assumption. Scientists would be forced to consider a whole new world of computer science.&lt;/p&gt; 
&lt;h3&gt;The future of quantum supremacy&lt;/h3&gt; 
&lt;p&gt;The ultimate goal for quantum computing is to create a fully functional, universal fault-tolerant gate computer. Before this machine can be built, computer scientists need to develop:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Refined error correction that doesn't require huge amounts of hardware.&lt;/li&gt; 
 &lt;li&gt;Advanced algorithms that can support the uniquely complex problems.&lt;/li&gt; 
 &lt;li&gt;Enhanced &lt;a href="https://www.techtarget.com/whatis/definition/noise"&gt;noise&lt;/a&gt;.&lt;/li&gt; 
 &lt;li&gt;Qubits with less noise sensitivity, longer coherence times and increased reliability.&lt;/li&gt; 
 &lt;li&gt;Quantum processors that possess thousands of qubits.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;The U.S. and China have been the most focused on investing in quantum projects, along with organizations and businesses such as Google, Microsoft, IBM, Lockheed Martin and Alibaba.&lt;/p&gt; 
&lt;h3&gt;Advantages and disadvantages of quantum supremacy&lt;/h3&gt; 
&lt;p&gt;Once quantum supremacy is displayed, quantum computers will provide superior use for crunching large data sets, such as those used in cancer research, drug design, genetic engineering particle physics and weather forecasting. Due to superposition, programmers working on developing tools to code quantum computers are unable to view the paths that their data takes from input to output, making the debugging process highly complicated.&lt;/p&gt; 
&lt;p&gt;While quantum supremacy can be extremely beneficial to various industries, the breakthrough could also lead to rogue states or actors using quantum computers for destructive purposes, such as breaking current encryption models.&lt;/p&gt; 
&lt;p&gt;&lt;i&gt;This article was originally written by Kate Brush. TechTarget editors updated the article in 2023 to improve the reader experience.&lt;/i&gt;&lt;/p&gt;</body>
            <description>Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classical computers by performing calculations previously impossible at unmatched speeds.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/1.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/definition/quantum-supremacy</link>
            <pubDate>Wed, 15 Mar 2023 14:18:00 GMT</pubDate>
            <title>quantum supremacy</title>
        </item>
        <item>
            <body>&lt;p&gt;The surge in remote working resulting from the new coronavirus pandemic has sparked a flurry of cybercriminal activity. Evaluator Group's recent study, "Enterprise IT Responds to COVID-19," found that security, data protection and disaster recovery are the IT areas most likely to get a boost as a result of the pandemic over the next six months.&lt;/p&gt; 
&lt;p&gt;In the words of one IT professional, "We're in the open. Hackers and bad actors are in the dark, always trying something new. Our job is to defeat them every time."&lt;/p&gt; 
&lt;p&gt;One way to do that is with solid backups. Especially in the &lt;a href="https://www.techtarget.com/searchdisasterrecovery/The-impact-of-coronavirus-on-business-continuity-planning"&gt;middle of a crisis&lt;/a&gt;, the need to protect backup data becomes a critical mission.&lt;/p&gt; 
&lt;h3&gt;Coronavirus-related cyberattacks on the rise&lt;/h3&gt; 
&lt;p&gt;The pandemic has provided bad actors with a global climate of fear to prey on. Phishing has risen, particularly in the form of email content that appears to come from a respectable source and allegedly claims to have information pertinent to COVID-19. The phishers hope to &lt;a href="https://www.techtarget.com/searchsecurity/news/252481832/Ransomware-attacks-see-148-surge-amid-COVID-19"&gt;install ransomware&lt;/a&gt; or other malicious software, or steal credentials to gain access to corporate databases or data stores.&lt;/p&gt; 
&lt;p&gt;Bad actors also deploy fake VPNs and have made efforts to exploit vulnerabilities in VPNs and other tools for remote connectivity. Hackers enact advanced persistent threats and target mobile devices as well. For example, certain Android applications claim to monitor COVID-19 symptoms or occurrences but contain spyware or other malware in disguise.&lt;/p&gt; 
&lt;p&gt;Extortion of healthcare, medical research and manufacturing organizations has been reported, as have numerous other scams and cybercriminal activities. Attacks change constantly, so it is important to maintain vigilance and continue to &lt;a href="https://www.evaluatorgroup.com/enterprise-it-responds-covid-19-study/" target="_blank" rel="noopener"&gt;educate yourself&lt;/a&gt;.&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/data_backup-it_initiatives_affected_over_6months-f.png"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineImages/data_backup-it_initiatives_affected_over_6months-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/data_backup-it_initiatives_affected_over_6months-f_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/data_backup-it_initiatives_affected_over_6months-f.png 1280w" alt="Chart of IT initiatives" height="403" width="560"&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;h3&gt;Best practices to protect backup&lt;/h3&gt; 
&lt;p&gt;Coronavirus-related cybercrime doesn't necessarily create new backup requirements, but it does highlight the &lt;a href="https://www.techtarget.com/searchdatabackup/feature/The-7-critical-backup-strategy-best-practices-to-keep-data-safe"&gt;importance of best practices&lt;/a&gt;. Immutability -- including write-once, read-many backup -- helps to preserve data integrity because immutable data cannot be erased or overwritten.&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   Backup recoverability improves data safety for all businesses. In the current climate, it's not a question of if an organization could face an attack, but when.
  &lt;/figure&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;p&gt;Creating and enforcing retention policies helps to ensure that no one can maliciously erase files, while &lt;a href="https://www.techtarget.com/whatis/definition/air-gapping"&gt;air-gapping&lt;/a&gt; can prevent hackers from accessing retention data. You should also encrypt data both at rest and in flight, as well as use data management best practices, including encryption key rotation and support for the Key Management Interoperability Protocol.&lt;/p&gt; 
&lt;p&gt;IT professionals can help &lt;a href="https://www.techtarget.com/searchsecurity/tip/Five-ways-to-prevent-a-ransomware-infection-through-network-security"&gt;protect backup environments from ransomware&lt;/a&gt; by using tools that monitor for anomalies. You should also run diagnostics on your backup environment and regularly test it to ensure confidence in recoverability and to determine the last-known good backup copy.&lt;/p&gt; 
&lt;h3&gt;Why is it important to protect backup?&lt;/h3&gt; 
&lt;p&gt;Protecting backup data is critical for two major reasons. A healthy backup environment determines the available recovery point objectives for the production environment. And so-called "sleeper" ransomware -- an attack designed to slowly &lt;a href="https://www.techtarget.com/searchdatabackup/feature/How-ransomware-variants-are-neutralizing-data-backups"&gt;infiltrate the backup environment&lt;/a&gt; -- causes long-term problems for organizations.&lt;/p&gt; 
&lt;p&gt;Backup recoverability improves data safety for all businesses. In the current climate, it's not a question of "if" an organization could face an attack, but "when."&lt;/p&gt; 
&lt;p&gt;&lt;em&gt;In part two of this two-part series, learn how the cloud can be a good choice for your &lt;a href="https://www.techtarget.com/searchdatabackup/tip/How-cloud-backup-can-help-remote-workers"&gt;remote backup&lt;/a&gt;. &lt;/em&gt;&lt;/p&gt;</body>
            <description>Be aware of innovative cyberattacks connected to the new coronavirus. Improve data safety with these backup best practices that can serve as a foundation of response preparation.</description>
            <image>https://cdn.ttgtmedia.com/visuals/searchExchange/exchange_server_security/exchange_article_020.jpg</image>
            <link>https://www.techtarget.com/searchdatabackup/tip/Use-and-protect-backup-against-COVID-19-related-cybercrime</link>
            <pubDate>Thu, 23 Apr 2020 10:58:00 GMT</pubDate>
            <title>Use and protect backup against COVID-19-related cybercrime</title>
        </item>
        <item>
            <body>&lt;p&gt;Zoom faced &lt;a href="https://www.techtarget.com/searchunifiedcommunications/news/252480965/Zoom-privacy-Vendor-faces-lawsuit-over-Facebook-data-sharing"&gt;privacy concerns&lt;/a&gt; after the disclosure of a vulnerability that could allow threat actors to use the video conferencing software to spy on users.&lt;/p&gt; 
&lt;p&gt;The Zoom vulnerability, originally reported to only affect the Mac version of &lt;a href="https://www.techtarget.com/searchunifiedcommunications/news/252465965/Verizon-to-resell-Zoom-video-conferencing-to-businesses"&gt;the software&lt;/a&gt;, has been found to partially affect Windows and Linux as well. Jonathan Leitschuh, software engineer at open source project Gradle, disclosed the &lt;a href="https://www.techtarget.com/searchunifiedcommunications/news/252474709/Cisco-cries-foul-over-security-flaw-in-Zoom-Connector"&gt;Zoom vulnerability&lt;/a&gt; in a &lt;a href="https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5"&gt;blog post&lt;/a&gt; earlier this week and said it "allows any website to forcibly join a user to a Zoom call, with their video camera activated, without the user's permission."&lt;/p&gt; 
&lt;p&gt;On top of this, this vulnerability would have allowed any webpage to DOS (&lt;a href="https://www.techtarget.com/searchsecurity/definition/denial-of-service"&gt;Denial of Service&lt;/a&gt;) a Mac by repeatedly joining a user to an invalid call," Leitschuh added. "Additionally, if you've ever installed the Zoom client and then uninstalled it, you still have a localhost web server on your machine that will happily re-install the Zoom client for you, without requiring any user interaction on your behalf besides visiting a webpage."&lt;/p&gt; 
&lt;p&gt;According to Leitschuh, it took Zoom 10 days to confirm the vulnerability and in a meeting on June 11, he told Zoom there was a way to bypass the planned fix, but Zoom did not address these concerns when Zoom reported the vulnerability fixed close to two weeks later. The Zoom vulnerability resurfaced on July 7, Leitschuh disclosed on July 8 and Zoom patched the Mac client on July 9. Zoom also &lt;a href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/" target="_blank" rel="noopener"&gt;worked with Apple&lt;/a&gt; on a silent background update for Mac users, released July 10, which removed the Zoom localhost from systems.&lt;/p&gt; 
&lt;p&gt;"Ultimately, Zoom failed at quickly confirming that the reported vulnerability actually existed and they failed at having a fix to the issue delivered to customers in a timely manner," Leitschuh wrote. "An organization of this profile and with such a large user base should have been more proactive in protecting their users from attack."&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Zoom -- whose &lt;a href="https://www.techtarget.com/searchunifiedcommunications/news/252462636/Unify-Square-adds-Slack-Zoom-FB-to-IT-management-software"&gt;video conferencing software&lt;/a&gt; is used by more than 4 million users in approximately 750,000 companies around the world -- downplayed the severity of the issue and refuted Leitschuh's characterization of the company.&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   This trust tradeoff, between making it easy and making it secure, is something that every consumer should consider.
  &lt;/figure&gt;
  &lt;figcaption&gt;
   &lt;strong&gt;Tom Patterson&lt;/strong&gt;Chief trust officer, Unisys
  &lt;/figcaption&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;p&gt;"Once the issue was brought to our Security team's attention, we responded within ten minutes, gathering additional details, and proceeded to perform a risk assessment," Richard Farley, CISO at Zoom, wrote in the company's response. "Our determination was that both the DOS issue and meeting join with camera on concern were both low risk because, in the case of DOS, no user information was at risk, and in the case of meeting join, users have the ability to choose their camera settings."&lt;/p&gt; 
&lt;p&gt;"To be clear, the host or any other participant cannot override a user's video and audio settings to, for example, turn their camera on," Farley added.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;Both the disclosure and response from Zoom portrayed the issue as only affecting the Mac client, but Alex Willmer, Python developer for CGI, &lt;a href="https://twitter.com/moreati/status/1148548799813640193" target="_blank" rel="noopener"&gt;wrote on Twitter&lt;/a&gt; that the Zoom vulnerability affected Windows and Linux as well.&lt;/p&gt; 
&lt;p&gt;"In particular, if zoommtg:// is registered as a protocol handler with Firefox then [Zoom] joins me to the call without any clicks," Willmer tweeted. "To be clear, a colleague and I saw the auto-join/auto-webcam/auto-microphone behavior with Firefox, and Chromium/Chrome; on Linux, and Windows. We did not find any webserver on port 19421 on Linux. We didn't check Windows for the webserver."&lt;/p&gt; 
&lt;p&gt;Leitschuh confirmed Willmer's discovery, but it is unclear if Zoom is working to fix these platform clients. Leitschuh also noted in his disclosure that the issue affects a whitehite label version of Zoom licensed to VoIP provider RingCentral. It is unclear if RingCentral has been patched.&lt;/p&gt; 
&lt;p&gt;Leitschuh told SearchSecurity via Twitter DM that "Zoom believes the Windows/Linux vulnerabilities are the browser vendors' to fix," but he disagrees.&lt;/p&gt; 
&lt;p&gt;Zoom did not respond to requests for comment at the time of this post.&lt;/p&gt; 
&lt;p&gt;Tom Patterson, chief trust officer at Unisys, said the tradeoff between security and ease of use is "not always a fair trade."&lt;/p&gt; 
&lt;p&gt;"The fact that uninstalling any app doesn't completely uninstall all components runs counter to engendering trust.&amp;nbsp;In this case, it's an architectural decision made by the manufacturers which appears to be designed to make operations much easier for users," Patterson told SearchSecurity. "This trust tradeoff, between making it easy and making it secure, is something that every consumer should consider."&lt;/p&gt;</body>
            <description>Companies and users around the world were impacted by a Zoom conferencing software flaw that could allow threat actors to forcibly join a video call without interaction.</description>
            <image>https://cdn.ttgtmedia.com/visuals/ComputerWeekly/Hero%20Images/surveillance-spy-big-brother-fotolia.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/252466678/Zoom-vulnerability-reveals-privacy-issues-for-users</link>
            <pubDate>Fri, 12 Jul 2019 13:16:00 GMT</pubDate>
            <title>Zoom vulnerability reveals privacy issues for users</title>
        </item>
        <item>
            <body>&lt;p&gt;Google last week announced a new &lt;a href="https://www.techtarget.com/searchsecurity/answer/Can-Googles-Chrome-extension-policy-improve-Web-security"&gt;Chrome extension policy&lt;/a&gt; amid growing security concerns about potential threats from third-party add-ons.&lt;/p&gt; 
&lt;p&gt;The company &lt;a href="http://blog.chromium.org/2015/05/continuing-to-protect-chrome-users-from.html"&gt;changed its Chrome extension policy&lt;/a&gt; to require all Windows and Mac users -- including developers -- to install extensions only from the Chrome Web Store. Previously, the company introduced the Chrome Web Store-only policy for Windows users a year ago, but Google still allowed developers and Mac users to install extensions from any source.&lt;/p&gt; 
&lt;p&gt;However, following the spread of malicious extensions to the developer channel, Google decided to enforce this policy universally. Extensions from outside the Chrome store are not subject to the same rigorous testing that Chrome Web Store extensions are, Google said. As a result, third-party extensions from outside the outside the Chrome Web Store could install spyware or other malware accidentally or intentionally as add-ons for seemingly harmless products.&lt;/p&gt; 
&lt;p&gt;"We originally did not enforce this policy on the Windows developer channel in order to allow developers to opt out," Jake Leichtling, extensions platform product manager for Chrome, said in a &lt;a href="https://blog.chromium.org/2015/05/continuing-to-protect-chrome-users-from.html" target="_blank"&gt;blog post&lt;/a&gt;. "Unfortunately, we've since observed malicious software forcing users into the developer channel in order to install unwanted off-store extensions."&lt;/p&gt; 
&lt;p&gt;Although extensions in the Chrome Web Store will be subjected to more meticulous security scanning, some problematic extensions have been able to slip by the company. Last month, a third-party Chrome extension called Webpage Screenshot was pulled from the Chrome Web Store due to security concerns; a report from researchers at Heimdal Security showed the extension used a delayed installation process to fool security scans and later installed spyware.&lt;/p&gt; 
&lt;p&gt;"Malware can change how browsers work by silently installing extensions on your machine that do things like inject ads or track your browsing activity," Chrome engineering director Erik Kay said in a &lt;a href="http://chrome.blogspot.com/2014/05/protecting-chrome-users-from-malicious.html" target="_blank"&gt;blog post in 2014&lt;/a&gt;. "Since the bad guys continue to come up with new ways to&amp;nbsp;&lt;a href="https://productforums.google.com/forum/#!category-topic/chrome/report-a-problem-and-get-troubleshooting-help/IkbJXYMH4Ds%5B1-25-false%5D"&gt;cause our users headaches&lt;/a&gt;, we are always taking additional measures."&lt;/p&gt; 
&lt;p&gt;Chrome will continue supporting local extension installs during development and installs that follow Chrome for Work and Education's &lt;a href="https://support.google.com/chrome/a/answer/188453"&gt;enterprise policy&lt;/a&gt;.&lt;/p&gt;</body>
            <description>Google's new Chrome extension policy mandates that all users and developers must install web browser extensions from the Chrome Web Store.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/6.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/news/4500246699/Google-changes-Chrome-extension-policy-amid-security-concerns</link>
            <pubDate>Wed, 20 May 2015 15:15:45 GMT</pubDate>
            <title>Google changes Chrome extension policy amid security concerns</title>
        </item>
        <item>
            <body>&lt;p&gt;Secure Sockets Layer (SSL) virtual private network (VPN) products, or &lt;a href="https://www.techtarget.com/searchnetworking/definition/virtual-private-network"&gt;SSL VPNs&lt;/a&gt;, provide encrypted tunnels that protect the network traffic that passes through them. SSL VPNs support the confidentiality and integrity of communications. They are most often used to enable secure remote access for end user devices, including desktops, laptops, smartphones and tablets. Secure remote access to selected organization resources can be a critical need for a wide variety of users, including the organization's employees (using either organization-issued or personally owned devices, &lt;a href="https://www.techtarget.com/whatis/definition/BYOD-bring-your-own-device"&gt;bring your own device (BYOD)&lt;/a&gt;), contractors, business partners and vendors.&lt;/p&gt; 
&lt;p&gt;There are several ways to procure SSL VPN products. An organization can purchase a standalone appliance that functions solely for SSL VPN, or a bundled device -- such as a &lt;a href="https://www.techtarget.com/searchsecurity/definition/next-generation-firewall-NGFW"&gt;next-generation firewall (NGFW)&lt;/a&gt; or &lt;a href="https://www.techtarget.com/searchsecurity/definition/unified-threat-management-UTM"&gt;unified threat management (UTM)&lt;/a&gt; product -- that performs many functions, with an &lt;a href="https://www.techtarget.com/searchsecurity/answer/What-VPN-alternatives-should-enterprises-consider-using"&gt;SSL VPN capability&lt;/a&gt; being just one of them. Yet another option for some organizations is to purchase their SSL VPN as a virtual appliance. Regardless of the form the SSL VPN capability comes in, its functionality and other major characteristics are basically the same.&lt;/p&gt; 
&lt;p&gt;This article focuses on evaluating dedicated SSL VPN products: standalone appliances and virtual appliances. This is not meant to imply that these are superior to bundled products. Each product, regardless of its form, needs to be evaluated on its own merits. It would be foolish for an organization to simply ignore an existing bundled SSL VPN capability just for the sake of having a dedicated SSL VPN product, without sufficient justification for making this decision. That being said, the dedicated SSL VPN products are often the same ones found bundled with others, so the evaluations presented in this article may also be relevant to organizations seeking bundled products.&lt;/p&gt; 
&lt;p&gt;This article covers the following commercial SSL VPN products: &lt;a href="https://www.barracuda.com/products/sslvpn"&gt;Barracuda SSL VPN&lt;/a&gt;, &lt;a href="http://www.checkpoint.com/products/mobile-access-software-blade/"&gt;Check Point Mobile Access Software Blade&lt;/a&gt;, &lt;a href="https://www.cisco.com/c/en/us/products/security/ios-sslvpn/index.html"&gt;Cisco IOS SSL VPN&lt;/a&gt;, &lt;a href="http://www.sonicwall.com/us/en/products/SSL-VPN-Platforms.html"&gt;Dell SonicWall Secure Remote Access (SRA)&lt;/a&gt;, Juniper Networks SA Series&amp;nbsp;(now Pulse Connect Secure), and &lt;a href="https://openvpn.net/index.php/access-server/overview.html"&gt;OpenVPN Access Server&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;Each of these has been evaluated against a set of four criteria: VPN client software options; operating system (OS) support; simultaneous users support and network access control. Organizations considering the acquisition of an SSL VPN product should use these criteria as one part of their overall product evaluation process. That's because each organization has unique characteristics that need to be taken into account, so the findings of this article should not be considered comprehensive or exhaustive -- they comprise one piece of a larger puzzle.&lt;/p&gt; 
&lt;blockquote class="main-article-pullquote"&gt;
 &lt;div class="main-article-pullquote-inner"&gt;
  &lt;figure&gt;
   Some commercial SSL VPN products only support a flat number of users, while other products have the hardware capacity to support a larger number of users but allow organizations to purchase a smaller number of simultaneous user licenses. 
  &lt;/figure&gt;
  &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/blockquote&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Criterion #1: VPN client software options"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Criterion #1: VPN client software options&lt;/h2&gt;
 &lt;p&gt;There are four approaches to SSL VPN client software:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Clientless (relies solely on the web browser, no software installation)&lt;/li&gt; 
  &lt;li&gt;Browser plug-in (Java applet, ActiveX control run within browser)&lt;/li&gt; 
  &lt;li&gt;Standalone executable for desktop and laptop OSs&lt;/li&gt; 
  &lt;li&gt;Mobile app for smartphones and tablets&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;The table below shows the major differences between these four approaches in terms of relative client deployment effort, resource access, client device support and &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-access-control"&gt;network access control&lt;/a&gt; support. These indicate that there is no "best" client approach; in fact, there are significant tradeoffs with each. For example, a clientless approach involves no deployment effort, but it also gives access to the fewest resources. For another, the browser plug-in and standalone executable approaches won't work for mobile devices. And not all of the approaches offer network access control capabilities.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Table 1: Four approaches to SSL VPN client software&lt;/b&gt;&lt;/p&gt;
 &lt;table border="1" cellspacing="0" cellpadding="5"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&amp;nbsp;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Clientless&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Browser plug-in&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Standalone executable&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Mobile app&lt;/b&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Client deployment effort&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;None&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Minor&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Major&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Major&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Resource access&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Websites and web-based applications&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Virtually all&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Virtually all&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Virtually all&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Client device support&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;All&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Most desktops and laptops (needs supported browser)&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Major desktop and laptop OSs&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Major mobile OSs&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Network access control&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes (may be limited)&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;So in the end, what most organizations should be looking for is the approach or combination of approaches that meets its full set of requirements. All products support multiple approaches, as shown in the table below; however, note that it is unlikely that a single organization will require support for all four approaches.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Table 2:&amp;nbsp; The client approaches supported by the top SSL VPN products&lt;/b&gt;&lt;/p&gt;
 &lt;table border="1" cellspacing="0" cellpadding="5"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&amp;nbsp;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Clientless&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Browser plug-in&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Standalone executable&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Mobile app&lt;/b&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Barracuda SSL VPN&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Check Point Mobile Access Software Blade&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Cisco IOS SSL VPN&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Dell SonicWall Secure Remote Access (SRA)&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Jupiter Networks SA Series&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;OpenVPN Access Server&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;No&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
    &lt;td width="128" valign="top"&gt;Yes&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Criterion #2: VPN client OS support"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Criterion #2: VPN client OS support&lt;/h2&gt;
 &lt;p&gt;The third and fourth SSL VPN client approaches discussed above&amp;nbsp; -- the standalone executable and the mobile app -- can be referred to as "heavy" because they require installation of full-fledged software (as opposed to a lightweight browser plug-in). This software is necessarily OS specific, so organizations need to carefully consider which OSs they need the SSL VPN clients to support. Remember that clientless and browser plug-in based approaches will work regardless of OS. With the exception of the open source OpenVPN Access Server, each product covered in this article supports the clientless or the browser plug-in approach.&lt;/p&gt;
 &lt;p&gt;So, when evaluating SSL VPN products, don't just automatically look at the specific OS that its client software may support. There may be "light" options (clientless or browser plug-in) available that truly do support virtually any OS. However, these light products may also offer reduced access to resources -- particularly clientless products -- and some lack network access control, increasing the likelihood of misconfigured, compromised or otherwise undesirable devices being able to connect to the organization's resources.&lt;/p&gt;
 &lt;p&gt;Assuming that an organization wants to use a "heavy" client-based approach, the first and obvious step in evaluation is cataloging which desktop/laptop OSs and mobile OSs need to be supported. This may prove difficult, especially if the organization allows the use of BYOD or if the organization allows contractors, business partners, vendors and others outside the organization to use remote access.&lt;/p&gt;
 &lt;p&gt;The table below shows OS support provided by the heavy clients. Of the products supporting heavy clients, the Dell SonicWall SRA and OpenVPN Access Server products support the greatest variety of OSs. Ultimately, however, the heavy clients provided by any product are not going to be able to support every version of every OS that might be used. So carefully consider using a heavy client for the most common versions and a light client for less common OSs.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Table 3: OS support by the top SSL VPN's "heavy" clients&lt;/b&gt;&lt;/p&gt;
 &lt;table border="1" cellspacing="0" cellpadding="5"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&amp;nbsp;&lt;/td&gt; 
    &lt;td width="240" valign="top"&gt;&lt;b&gt;Standalone executable&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="252" valign="top"&gt;&lt;b&gt;Mobile app&lt;/b&gt;&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Barracuda SSL VPN&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="240" valign="top"&gt;N/A&lt;/td&gt; 
    &lt;td width="252" valign="top"&gt;N/A&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Check Point Mobile Access Software Blade&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="240" valign="top"&gt;N/A&lt;/td&gt; 
    &lt;td width="252" valign="top"&gt;iOS, Android&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Cisco IOS SSL VPN&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="240" valign="top"&gt;Windows&lt;/td&gt; 
    &lt;td width="252" valign="top"&gt;N/A&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Dell SonicWall Secure Remote Access (SRA)&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="240" valign="top"&gt;Windows, Mac OS X, Linux&lt;/td&gt; 
    &lt;td width="252" valign="top"&gt;iOS, Android, Windows 8.1, Kindle Fire&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;Jupiter Networks SA Series&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="240" valign="top"&gt;N/A&lt;/td&gt; 
    &lt;td width="252" valign="top"&gt;N/A&lt;/td&gt; 
   &lt;/tr&gt; 
   &lt;tr&gt; 
    &lt;td width="128" valign="top"&gt;&lt;b&gt;OpenVPN Access Server&lt;/b&gt;&lt;/td&gt; 
    &lt;td width="240" valign="top"&gt;Windows, Mac OS X, Linux&lt;/td&gt; 
    &lt;td width="252" valign="top"&gt;iOS, Android&lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Criterion #3: Support for simultaneous users"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Criterion #3: Support for simultaneous users&lt;/h2&gt;
 &lt;p&gt;Licensing for commercial SSL VPN products is typically based on the number of simultaneous users of the VPN. There are exceptions to this, such as virtual appliances that may offer unlimited scalability, but generally it is true. Some commercial products only support a flat number of users, while others have the hardware capacity to support a larger number of users but allow organizations to purchase a smaller number of simultaneous user licenses.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;Some vendors offer several models of SSL VPN appliances. For example, the Barracuda SSL VPN is available in six hardware appliance models supporting between 15 and 1000 simultaneous users, and four virtual appliance models supporting between 15 and 500 simultaneous users. Similarly, the Cisco IOS SSL VPN, which is geared toward small organizations, provides support for 10 to 200 simultaneous users on a variety of hardware platforms.&lt;/p&gt;
 &lt;p&gt;For midsize to large organizations, the Juniper Network SA Series (which was spun off to Pulse Secure and renamed as &lt;a href="https://www.pulsesecure.net/products/connect-secure/" title="Pulse Connect Secure"&gt;Pulse Connect Secure&lt;/a&gt;) offers three models of appliances handling up to 10,000 concurrent users, as well as a virtual appliance that can support an unlimited number. The Dell SonicWall SRA has three hardware appliance models that support between 25 and 20,000 concurrent users, and a virtual appliance that can support up to 5,000.&lt;/p&gt;
 &lt;p&gt;In addition to these licensing schemes, some products, such as Juniper Networks SA Series, offer surge licensing, meaning that the number of simultaneous users can be increased temporarily under emergency conditions; for example, for a week during a natural disaster. Surge licensing can also be normally purchased and provisioned immediately, which makes it an ideal aid for disaster recovery and contingency planning -- assuming that the SSL VPN hardware is robust enough to support that many simultaneous users.&lt;/p&gt;
 &lt;p&gt;The OpenVPN Access Server follows a significantly different licensing model than the other products in this article. There is no hardware appliance available; all OpenVPN Access Server servers are &lt;i&gt;virtual&lt;/i&gt;. This virtual server component can be downloaded for free, but organizations with a minimum of 10 users must pay an annual licensing fee for each simultaneous user. As of this writing, it's possible to purchase a 10-user concurrent license for under $100 per year. On the other hand, there does not appear to be a maximum limit to concurrent users, although -- obviously -- the hardware the server is deployed to will effectively limit simultaneous usage at some point.&lt;/p&gt;
 &lt;p&gt;In general, there is no right answer as to which of these licensing models is best for specific organizations. Smaller ones may be interested in nearly any of the offerings, while larger organizations would likely tend toward products that support massive enterprises, such as Dell SonicWall SRA, Juniper Network SA Seriesm and OpenVPN Access Server.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Criterion #4: Network access control"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Criterion #4: Network access control&lt;/h2&gt;
 &lt;p&gt;A final criterion for SSL VPN product evaluation is support for network access control. This refers to a wide variety of features that involve checking the characteristics of the client device to confirm compliance with the organization's security policies. Examples include verifying the presence of current &lt;a href="https://www.techtarget.com/searchsecurity/definition/antivirus-software"&gt;antivirus software&lt;/a&gt; and authenticating a client-side digital certificate.&lt;/p&gt;
 &lt;p&gt;Most products -- even those with only light clients, such as Barracuda SSL VPN -- do provide at least some support for network access control. Vendors are generally reticent to detail exactly how their network access control products work; many of which are likely to operate significantly differently on various OSs. So it is recommended as part of any evaluation to first identify the relevant desktop/laptop and mobile OS versions, then consult with the vendor to see which network access control features -- system health checks -- the products support on each platform.&lt;/p&gt;
 &lt;p&gt;An example of robust network access control support involves the Dell SonicWall SRA product. It can verify whether mobile devices have been &lt;a href="https://www.techtarget.com/whatis/definition/jailbreaking"&gt;jailbroken&lt;/a&gt; or rooted; check if various security controls have been installed and configured properly, and examine client certificates and identifiers to ensure that the device itself is authorized for enterprise remote access use. Other products that advertise network access control support include Cisco IOS SSL VPN and Juniper Networks SA Series.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Conclusion"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Conclusion&lt;/h2&gt;
 &lt;p&gt;There is no clear frontrunner among the SSL VPNs covered in this article.&amp;nbsp; So much is dependent on an individual entity's needs in terms of client software support and OS support, simultaneous user licensing, and network access control.&lt;/p&gt;
 &lt;p&gt;For example, an enterprise that allows BYOD may determine that it absolutely needs &lt;a href="https://www.techtarget.com/searchsecurity/feature/Introduction-to-network-access-control-products-in-the-enterprise"&gt;network access control&lt;/a&gt; to assure some degree of security among its remote access clients. In that case, it might favor products such as Dell SonicWall SRA and Juniper Networks SA Series that offer particularly rigorous network access control. Meanwhile, an organization that does not allow BYOD may find network access control superfluous for these devices.&lt;/p&gt;
 &lt;p&gt;For smaller companies, all of these products offer some sort of acceptable solution. The Cisco IOS SSL VPN is best suited for organizations that already have another security product in place for their mobile devices; for example, a &lt;a href="https://www.techtarget.com/searchsecurity/feature/Introduction-to-mobile-device-management-products"&gt;mobile device management system&lt;/a&gt;. The Check Point Mobile Access Software Blade is appropriate for those already having Check Point security products deployed. Other products are well suited for a wider variety of small and medium sized organizations because of the resource access they grant, the range of client devices they support and their ability to provide network access features.&lt;/p&gt;
 &lt;p&gt;For larger entities (thousands of concurrent users), definitely consider the Dell SonicWall SRA and the Juniper Networks SA Series, with the Check Point Mobile Access Software Blade and the OpenVPN Access Server following close behind.&amp;nbsp;&lt;/p&gt;
 &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Expert Karen Scarfone examines the top SSL VPN products available today to help enterprises determine which option is the best fit for them.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/6.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/feature/Comparing-the-top-SSL-VPN-products</link>
            <pubDate>Tue, 28 Apr 2015 15:37:00 GMT</pubDate>
            <title>Comparing the top SSL VPN products</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;b&gt;It's pretty well known that just because logs of an attack show a source IP address from a particular country, it does not necessarily mean it's possible to assign attribution to that country. Is there a more effective way to identify where an attack is coming from?&lt;/b&gt;&lt;/p&gt; 
&lt;p&gt;Unless you are working with law enforcement or have a specific reason, it's probably not worth the effort to determine where an attack is coming from. In any event, being able to locate an IP address location gives minimal information as to how to stop the attack other than by blocking the source IP or source network. If the attacking systems are using DHCP, proxies, compromised systems, VPNs, Amazon EC2 or any number of other methods that can allow for a change of source IP, however, blocking the source IP will be ineffective. Also, blocking based on IP or subnets requires some maintenance overtime, as IP blocks slowly change.&lt;/p&gt; 
&lt;p&gt;It may be easier to define where connections are allowed to come from -- i.e., whitelist connections -- rather than where they are not allowed to come from. This may not be possible for Web servers or services that must be available to the public, but, for internal systems that need to be Internet accessible to a limited population, defining the sources might be possible and more secure. This is not to say you shouldn’t block IPs used in attacks for the duration of an attack, but you should understand the value of blacklisting and whitelisting IPs.&lt;/p&gt; 
&lt;p&gt;If you really need to assign attribution to a country, you could look at decompiled binaries used in an attack to see if there are any clues to the language in use in comments, status messages reported by the software, logs of communications, keyboard mapping, OS version if it includes language configurations, or the time zone settings. These settings can give some information about the attacker.&lt;/p&gt;</body>
            <description>What's the best way to determine the origin of a cyberattack? Expert Nick Lewis weighs in.</description>
            <image>https://cdn.ttgtmedia.com/visuals/digdeeper/2.jpg</image>
            <link>https://www.techtarget.com/searchsecurity/answer/Locate-IP-address-location-How-to-confirm-the-origin-of-a-cyberattack</link>
            <pubDate>Thu, 25 Aug 2011 12:34:45 GMT</pubDate>
            <title>Locate IP address location: How to confirm the origin of a cyberattack</title>
        </item>
        <title>Search Security Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
