Sophisticated, targeted attacks have become increasing difficult to detect and analyze. Attackers can employ 0-day vulnerabilities and exploit obfuscation techniques to evade detection systems and “fly under the radar” for long periods of time.
Gartner estimates 85% of breaches go completely undetected and 92% of the detected breaches are reported by third parties. New strategies for identifying network attack activity are necessary.
Learn how network logging technologies such as NetFlow and IPFIX can be applied to the problem of detecting sophisticated, targeted attacks and used to create an audit trail of network activity that can be analyzed, both automatically and by skilled investigators, to uncover anomalous traffic.
Lancope will demonstrate how these records can be used to:
Discover active attacks in each phase of the attacker’s “kill chain.”
Determine the scope of successful breaches and document the timeline of the attacks
Would you like fries with that? Cyber criminals are taking a cue from fast food chains and bundling exploit packages complete with all the tools needed to launch successful security attacks against various targets. These toolkits are on the rise and getting more dangerous. This webinar will provide an introduction to exploit toolkits, including the estimated number of infections and an overview on some of the CVEs they are affecting. The speaker will discuss several known toolkits including NicePack, Phoenix and BlackHole, citing the evolution of these attacks and obfuscation techniques.Read more >
The adoption of SaaS is accelerating faster than expected. However, as this SaaS adoption accelerates, enterprises are discovering various legal and regulatory data compliance responsibilities that maybe challenging to address in a seamless manner or potentially slow down the adoption of SaaS applications and potentially innovation.
• How enterprises can leverage the full value of SaaS applications such but fully meet complex data compliance needs without impacting the usability of the SaaS application. Learn how sensitive data can be protected yet leverage the full benefits of the SaaS application without breaking SaaS application functionality such as searching, sorting and reporting of sensitive data.
• The different methods of data obfuscation such as 'data tokenization' and 'data encryption' and understand the specifics when meeting and demonstrating data compliance in a SaaS environment.
• If SaaS vendor application encryption can be relied upon to address your enterprises data compliance requirements when the sensitive data is encrypted just at rest. What are the data compliance implications of key management and who controls the encryption keys?
More malware today is machine-generated and one-off. With advanced malware also employing obfuscation and anti-sandboxing techniques, just how "secure" are secure web gateways? The reality is - many are just not that secure anymore. Based on 2015 breach investigations, Trustwave found that 42% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content.
Join our webinar where we will cover practical steps nearly any organization can take to optimize protection and policy control for your web users. We will be discussing real-world ideas on how to:
-Ensure real-time blocking of encrypted new malware.
-Easily keep policy optimized.
-Virtually patch web browsers, and more.
The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.Read more >
Over the past decade, the web has become an increasingly dangerous place, as attackers launch ever more sophisticated attacks. Enterprises of all sizes, from small to global, need to protect their internal systems against both inbound and outbound attack vectors.
External attacks can take many forms. A user’s email address may be exposed to hackers who send a phishing message with links to a web site that downloads malicious software onto the user’s PC without them being aware of it. Or, an advanced malware attack may use sophisticated obfuscation techniques to hide its true identity, enabling it to slip past a signature-based malware detection tool.
Data leakage can come from internal users who, inadvertently or deliberately, transfer sensitive or confidential information outside the network perimeter, or a botnet client transmitting a password file to a master server located overseas.
To counter these threats, security professionals need to deploy interlocking, coordinated security systems designed to work together. In this session, McAfee will discuss how its security platforms work together to comprehensively address the multiple security threats that customer’s encounter.
•Overview: current malware trends and frequently encountered attack types
•Interlocking lines of defense:
oFirewall, Intrusion Prevention Service
oAdvanced Threat Defense
oData Loss Prevention
oMcafee Content Security Suite