Blog

Detecting the Invisible Part 3: "Retreat from the Breach"

Our approach to securing the enterprise has changed, and breach detection technology has been largely instrumental in this process. This report from NSS Labs is the final in a three-part series on the impact of the breach detection system (BDS).

As the breach detection market continues to mature, several points are worth noting:

Detecting the Invisible Part 2: "Once More Unto the Breach, Dear Friends"

Our approach to securing the enterprise has changed, and breach detection technology has been largely instrumental in this process. This report from NSS Labs is the second in a three-part series on the impact of the breach detection system (BDS).

Breached? Continuous Forensic Analytics Speeds Incident Response

Over the course of the last few years, the number of publicized breaches has risen dramatically, ultimately costing some CXOs their jobs. The irony is that in many cases, the breach itself is not the cause of their dismissal, but rather it is the handling of the situation after the breach is discovered and how quickly the executives can assemble the answers. It takes considerable talent and time (often weeks or months) to work through the incident response (IR) process within most organizations.

Detecting the Invisible

Our approach to securing the enterprise has changed, and breach detection technology has been largely instrumental in this process. This report from NSS Labs is the first in a three-part series on the impact of the breach detection system (BDS).

How Does The Average Enterprise Stay On Top of The Latest Technology?

You’ve probably heard the phrase “drinking from a fire hose,” and in the security world, it has never been more applicable than it is today.

NSS Research Reveals NGFW has Strengthening Role in Enterprise

Next generation firewalls (NGFWs) have become perimeter security “table stakes” for enterprise security. Potentially the most important network security investment an enterprise can make, NGFW technology is in high demand. There is considerable differentiation within the market, in spite of the fact that it has yet to reach maturity, and new features such as integrated threat intelligence feeds, cloud forensics, automated black-list population, and sandboxing have made purchasing decisions more complex.

2015: Rethinking Defense Starts With Better Information

The past year has been rife with an alarming increase in grievous information security incidents. Breaches, widely distributed software critical vulnerabilities, and increasingly sophisticated attacks all appeared with frightening regularity. Everyone who works in information security knows it’s a tough role. Much like public utilities, no one is grateful or concerned until it doesn’t work or isn’t there. Once you have been breached, the resolution will take considerably more time and investment than implementing simple preventative investments in the first place.

Unicorn Just Got Real: Malware Analysis

Analysis of the Dropped Malware

Name: v3k.exe

MD5: 74CE6CB9F8B983297F936936BCABC698

SHA1: B76B514707CD560F973DD66124D2C1101D75078A

SHA-2/256: 11F5F243E07BFD173F8EEC248ADF457540926CD7E0725381DA04C46E8C39A15B

The malware is a little different to that which is typically dropped from regular exploit kits and malware campaigns. The difference lies in the way in which this malware is packaged, and in its method of operation.

Having Your Virtual Cake and Eating It Too

Today’s continuously evolving threat landscape and the need for business continuity mandate the need to rethink security workflows. Robust virtual data centers and considerable computing power are the ingredients for a new approach to securing critical data. With an adaptive approach, mission and business functions can continue at the same time that malware is encapsulated and monitored.

Unicorn Just Got Real

Through the Cyber Advanced Warning System, NSS Labs is already observing reliable exploits for CVE-2014-6332 in the wild. Microsoft released security updates on November 11, 2014 to patch this vulnerability.

Pages

Go to top