Security Wire Weekly:

Threat Monitor

September 5, 2012  7:51 PM

The case for using anomaly based monitoring in zero day detection

Posted by: Eric Parizo
Threat Monitor

In light of recent failures by the signature-based model, expert Char Sample discusses anomaly-based monitoring technology and the potential it holds for enterprise security.

August 16, 2012  2:59 PM

How diligent user account security thwarts password recovery attacks

Posted by: Eric Parizo
Threat Monitor

The recent CloudFlare hack showed how poor user account security and password recovery can be compromised. Learn how to avoid a similar incident.

July 15, 2010  7:11 PM

KHOBE attack technique: Kernel bypass risk or much ado about nothing?

Posted by: Jessica Scarpati
KHOBE, Threat Monitor

Threat MonitorSome say the KHOBE attack technique is a serious threat looming over enterprises, while others believe it's been greatly over-hyped. Who's right? Nick...

June 3, 2010  1:00 PM

Incident response security plans for advanced persistent threat

Posted by: Jessica Scarpati
Advanced Persistent Threat, Threat Monitor

Threat MonitorDealing with advanced persistent threat (APT) presents unique challenges. Learn how an incident repsonse program can save your enterprise from APT.

May 20, 2010  9:10 PM

Create a data breach response plan in 10 easy steps

Posted by: Jessica Scarpati
Security incident respnse, Threat Monitor

Threat MonitorHaving a solid data breach response plan in place can make the threat of a security breach less intimidating. In this tip, learn 10 steps to an effective...

May 6, 2010  6:22 PM

Defining an incident response process when short staffed

Posted by: Jessica Scarpati
Security incident respnse, Threat Monitor

Threat MonitorThe incident response process can be difficult when short staffed. In this tip, learn how to put together a computer security incident response team by...

April 15, 2010  6:25 PM

Operation Aurora: Tips for thwarting zero-day attacks, unknown malware

Posted by: Jessica Scarpati
Threat Monitor

Threat MonitorIn December 2009, Google, Adobe and other companies were the victims of a damaging cyberattack called Operation Aurora. In this tip, expert Nick Lewis...

March 18, 2010  7:30 PM

Web application attacks security guide: Preventing attacks and flaws

Posted by: Jessica Scarpati
Cross-site scripting, Threat Monitor

Threat MonitorFrom buffer overflows to SQL injection, hackers have many techniques at their disposal to attack Web applications, and new methods constantly emerge. This...

March 8, 2010  2:58 PM

Clientless SSL VPN vulnerability and Web browser protection

Posted by: Jessica Scarpati
Threat Monitor, VPN Security

Threat MonitorIn a recent US-CERT advisory, clientless SSL VPN vulnerabilities were listed as posing serious threats to Web browser security. In this tip, learn...

February 18, 2010  6:16 PM

Defending against RAM scraper malware in the enterprise

Posted by: Jessica Scarpati
malware, Threat Monitor

Threat MonitorA new type of malware attack, RAM scraper, may pose a serious threat to enterprise security. Learn what a RAM scraper attack is, and how you can defend...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: