Black Hat USA 2015, one of the world’s most technical and relevant global information security events, is approaching, and Dell SecureWorks will be there to offer insights about the current cybersecurity landscape and how organizations can arm themselves against evolving threats.
Arming your employees with tools to help prevent attacks is a start, but it has to be done effectively and it isn’t enough to secure your information. Technological safeguards work hand-in-hand with awareness training to support a strong security posture.
It seems every day we hear about another security breach, prompting us to reexamine how secure our data is. As the threat landscape evolves, vigilance to protect sensitive personal and professional information becomes more and more important. Here’s what you can do to keep on top of securing your identity.
Companies need to efficiently use resources and sometimes that requires reallocating funds or spending cuts. With today’s landscape, organizations can no longer afford to sacrifice information security for the sake of other parts of the business.
Small businesses cannot operate under the assumption they fly under the radar when it comes to malicious hackers. On the contrary, threat actors know growing businesses have security vulnerabilities and often target them specifically to steal their data or use them to gain access to bigger organizations.
Dell SecureWorks Counter Threat Unit researchers have found that threat groups victimizing a particular vertical today may infiltrate new verticals tomorrow. Organizations should never dismiss the threat from groups that seem to only target other industries and should have thorough plans and mitigation strategies in place.
Dell SecureWorks Counter Threat Unit™ (CTU) researchers analyzed a stealthy malware family named Stegoloader that has been active since at least 2013 and yet is relatively unknown. It has been distributed through software piracy websites, bundled with software license key generators.
Dell SecureWorks CTU researchers responded to an intrusion perpetrated by Threat Group-1314 (TG-1314), one of numerous threat groups that employ the “living off the land” technique to conduct their intrusions. Detecting threat actors who are “living off the land,” using credentials, systems, and tools they collect along the way instead of backdoors, can be challenging for organizations that focus their instrumentation and controls primarily on the detection of malware and indicators such as command and control IP addresses, domains, and protocols.
The healthcare industry is a major target for threat actors, and a breach could expose sensitive data such as medical records, social security numbers, and financial information if organizations aren’t prepared. But there are steps organizations can take to better arm themselves against malicious attacks and mitigate the risk.
It is Monday morning. You open your eyes as your alarm bellows into your ear. You awaken and think “Wow! The Barry Manilow concert was superb on Friday. I am glad I was able to go.” Soon, your remnant glee dissolves as you realize the tasks awaiting you this morning. You still have the problems […]