• May 24, 2013
    Whether considered advanced persistent threats (APTs) or malware-based espionage attacks, successful and long-term compromises of high-value organizations and enterprises worldwide by a consistent set of campaigns cannot be ignored.
  • April 04, 2013
    SCADA devices do not differ from IT devices in that they also require redundancy, security, reduced costs, and uptime. There are several ways that SCADA in the cloud can be approached and installed, but each has their own potential security issues.
  • March 15, 2013
    Research on Internet-facing ICS/SCADA systems, who’s really attacking them, and why.
  • March 15, 2013
    This research paper illustrates who’s really attacking Internet-facing ICS/SCADA systems and why. It also covers techniques to secure ICS/SCADA systems and some best practices to do so.
  • February 21, 2013
    So you've been hit by a targeted attack. The problem? You don't even know it yet. Targeted attacks continue to thrive within a system via hidden modes of communication. The faster a company catches these exchanges, the faster they are to stop.
  • February 21, 2013
    Once inside a network, targeted attacks can use it as a highway to further a campaign. By using network traffic, coupled with threat intelligence, enterprise response teams can monitor and stop attacks before their respective attackers get away with their goal
  • February 15, 2013
    Stealth gives an attacker the ultimate advantage against his targets. Once successfully placed inside his victim’s network, an attacker’s tools become his eyes and ears, which he can use to send and receive information that will further his campaign.
  • February 15, 2013
    In terms of security, an enterprise is only as strong as his weakest employee. Uninformed, reckless, and disgruntled employees can be the unwitting cause of a targeted attack. Strict employee policies and education programs should be enterprise priorities.
  • February 15, 2013
    With threat actors relying on open-source information for their social engineering attacks, businesses will have to weigh in on what’s more important: securing their company or improving their online presence. Striking a balance between the two might prove tri