CyberSecurity
555 views | +1 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Nigel Willson
Scoop.it!

Prominent security mailing list Full Disclosure shuts down indefinitely - PCWorld (blog)

Prominent security mailing list Full Disclosure shuts down indefinitely - PCWorld (blog) | CyberSecurity | Scoop.it
“CSO Prominent security mailing list Full Disclosure shuts down indefinitely PCWorld (blog) In an announcement posted Wednesday on the list, John Cartwright, the list's co-founder and administrator, said that a recent content removal request from a...”
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

APT Strategy Guide

APT Strategy Guide | CyberSecurity | Scoop.it
APT Strategy Guide - Navigating the APT Strategy Series Continuous monitoring is an important part of an organization’s cyber security efforts. But without establishing an effective security framew...
Nigel Willson's insight:

Navigating the APT Strategy Series

more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

APT Red Teams - Part 2

APT Red Teams - Part 2 | CyberSecurity | Scoop.it
APT Red Teams - Part 2 APT Red Teams - Part 1 APT Red Teams - Part 3 Have you tested your resilience to attack? Addressing security more aggressively and working to identify areas of weakness is a ...
Nigel Willson's insight:

Addressing security more aggressively and working to identify areas of weakness is a more sensible, and ultimately, more effective approach than working to build a “bigger wall” ...

more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

ThreatTrack Security Introduces Automated APT Remediation

ThreatTrack Security Introduces Automated APT Remediation | CyberSecurity | Scoop.it
ThreatTrack Security today announced ThreatSecure, the advanced malware protection platform that provides real-time detection and automated remediation of threats that evade traditional signature-based defenses.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Case Study: APT Preparation, Planning and Persistence

Case Study: APT Preparation, Planning and Persistence | CyberSecurity | Scoop.it
The SEA attack of Forbes doesn’t seem to have been technically complex. But the hackers were nonetheless clever and persistent enough to stay a step ahead of the media company’s security measures.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Top 10 Most Wanted Enterprise Threats

Top 10 Most Wanted Enterprise Threats | CyberSecurity | Scoop.it
Visibility into what threats are most common in enterprise environments helps organizations assess their current security posture and better prioritize their security investments.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Advanced malware: The growing cyber menace

Advanced malware: The growing cyber menace | CyberSecurity | Scoop.it
“My overall concern is, as it's always been, is that it's a lot easier to attack than defend on the internet.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

After a Digital Attack: A Story of Recovery

After a Digital Attack: A Story of Recovery | CyberSecurity | Scoop.it
Inside Forbes: After a Digital Attack, a Story of Recovery and What It Means
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Indicators of Compromise: Windows Crash Reports

Indicators of Compromise: Windows Crash Reports | CyberSecurity | Scoop.it
You never know what you'll glean from a Windows crash report: security researchers recently unearthed a previously unknown advanced persistent threat campaign by perusing and analyzing crash reports known as Dr. Watson.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

APT Strategy: Evolve towards Creative Discipline

APT Strategy: Evolve towards Creative Discipline | CyberSecurity | Scoop.it
Williamson is among those who also argue that detecting and defending against APTs effectively will take more than technology. In general, he says, "the biggest change we need is not one of tactics, but strategy.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Smart Practices: Application Security Testing Skills

Smart Practices: Application Security Testing Skills | CyberSecurity | Scoop.it
There’s a shortage of application security experts. Hackers seem to continually have the upper hand over those trying to defend applications against threats. The bottom line is that we’re writing code faster than we can secure it.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

APT Detection Indicators - Part 3

APT Detection Indicators - Part 3 | CyberSecurity | Scoop.it
APT Detection Indicators - Part 3: Command & Control Channels APT Detection Indicators - Part 1 APT Detection Indicators - Part 2 When securing a network most organizations are more concerned w...
Nigel Willson's insight:

Understanding C&C and C&C channels is critical to effectively detect, contain, analyze, and remediate targeted malware incidents.

more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

APT Anomaly Detection - Part 1

APT Anomaly Detection - Part 1 | CyberSecurity | Scoop.it
APT Anomaly Detection - Part 1: Eliminating the Noise The rapid discovery of a breach is key to minimizing the damage of a targeted attack. Context-aware anomaly detection improves an organizations...
Nigel Willson's insight:

Improve security analyst efficiency, reduce operational overhead and cost by eliminating noise

more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

APT Threat Analytics - Part 2

APT Threat Analytics - Part 2 | CyberSecurity | Scoop.it
APT Threat Analytics - Part 2 APT Threat Analytics - Part 1 In today's threat environment, rapid communication of pertinent threat information is vital to quickly detecting, responding and containi...
Nigel Willson's insight:

With the increase in advanced, multidimensional threats, more and more organizations are considering development of an in-house threat intelligence program ...

more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Hypervisor as a Security Solution? - Context, Isolation, Ubiquity

Hypervisor as a Security Solution? - Context, Isolation, Ubiquity | CyberSecurity | Scoop.it
The idea is to provide a secure platform where third parties can pull out context and to have security controls enforced within the infrastructure. Not only are context and isolation a big factor, but so is the ubiquity of the hypervisor.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Malware: What's in a name?

Malware: What's in a name? | CyberSecurity | Scoop.it
Experts say re-naming 'malware' would be pointless. But they agree it has become much different and much more...
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Securing the Internet of Things

Securing the Internet of Things | CyberSecurity | Scoop.it
There is a website which tells you what houses are safe to burgle. Fill in a simple on-line form and, using publically-available data and some information trawled from live geo-location phone apps, it will tell you if the person is at home or not.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

The Changing Security Paradigm

The Changing Security Paradigm | CyberSecurity | Scoop.it
"The old security paradigm was to raise the bar sufficiently so that attackers would seek easier targets elsewhere, today's new paradigm is, ... where there is the will, there is a way. Be prepared to detect and respond", Nigel Willson.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Cyphort Launches a New Advanced Threat Defense

Cyphort Launches a New Advanced Threat Defense | CyberSecurity | Scoop.it
Security Architect: Cyphort Launches a New Advanced Threat Defense...



http://security-architect.blogspot.com/2014/02/cyphort-launches-new-advanced-threat.html
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Threat Intelligence Fusion

Threat Intelligence Fusion | CyberSecurity | Scoop.it
Threat intelligence fusion - a process of making better intelligence out of existing intelligence by enriching, linking, validating, contextualizing and otherwise growing the depth or breadth of available threat intelligence data sets.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Critical Infra Incidents Lack Detection and Logging

Critical Infra Incidents Lack Detection and Logging | CyberSecurity | Scoop.it
Many security incidents that affect components of the nation's critical infrastructure go unnoticed due to a lack of sufficient detection or logging capabilities, according to a new report.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Security: The Devil is in the Details - Checklist? Check.

Security: The Devil is in the Details - Checklist? Check. | CyberSecurity | Scoop.it
Any gap in our security thinking can be leveraged by the bad guys, and multiple gaps can lead to massive incidents like these.





To be effective, security needs to be everywhere.
more...
No comment yet.
Scooped by Nigel Willson
Scoop.it!

Leveraging the Cyber Framework as a Minimum Baseline

Leveraging the Cyber Framework as a Minimum Baseline | CyberSecurity | Scoop.it
Five Reasons Why the Cyber Framework Truly Matters
more...
No comment yet.