Top 5 SSL Attack Vectors
- SSL/TLS certificates need to be at least 2048-bit RSA or 256-bit ECC
- The only secure, standard hash algorithm is SHA-2
- Root certificates must be heavily defended by the CA
- The security of systems storing and using private SSL/TLS keys must also be tightly guarded
Forrester paper: The Total Economic Impact™ Of IBM DB2 With BLU Acceleration
View IBM's privacy policy here
EB Cyber Security Playbook
- Five guiding principles for what a response plan should address
- Dealing with disclosure–what to tell customers and the media
- Bolstering your defenses after a breach
WP Biz Case for FaaS
- Properly communicate the challenges you face
- Assess the business impact
- Shift the discussion from technically-focused to dollars and cents.
RPT APT 30
WP 12 Proven IR Strategies
Download now to learn more.
WP How Secure Do You Want to Be
A resulting breach can be devastating, leading most organizations to re-evaluate their security program. Critically evaluating your security program in its entirety and looking for the areas it can be improved is a daunting task.
WP Are You Ready to Respond
Today, companies need to conduct a comprehensive response readiness assessment that lays out what steps to take in the event of a breach in order to minimize the damage and recover from the intrusion as quickly as possible.
WP Enemies in Our Midst
Most attackers remain active in environments for a significant amount of time before being discovered. And only a small percentage of organizations discover the presence of advanced attackers themselves—most need to be informed by law enforcement or a proactive third-party security firm. By then, an attacker could do a great deal of damage.
A compromise assessment answers the all-important question: Have you been breached?
RPT M-Trends 2016
The annual report was compiled by consultants at Mandiant, a FireEye company, and is based on hundreds of Mandiant incident response investigations in more than 30 industry sectors. It offers recommendations on how organizations can improve the way they prevent, detect, analyze and respond to cyber attacks.
Mobility vs. Security: Balancing Accessibility and Efficiency against Threats Internal and External
In today’s application economy, IT and business units are focused on increasing employee effectiveness and driving customer loyalty with a broad range of new ‘mobile-first’ applications. Having ‘an app for that’ offers many benefits – consumer-like experiences, increased use of enterprise applications, support for mobile workforce and a global customer base, to name just a few. But with each new mobile app – and mobile user – comes another attack surface and possible source of data loss or regulatory infraction. What now?
Attend this Slashdot webinar to hear our expert panel discuss the challenges facing IT, developers and DevOps teams today, and what enterprises of all sizes should be doing to ensure their applications and users aren’t at risk. Attendees will hear:
- How MDM is evolving, and what that means to users and IT
- Methods of controlling devices that access your network and apps – simply
- Why provisioning matters, and how to accelerate onboarding and retiring of users and devices
- How to give users secure corporate access while retaining their existing mobile experience
- Why content is king – and how to collaborate securely no matter how large the group
- How to give access behind the firewall – without messy configuration settings or VPNs.
Don’t wait – register now for this timely webinar and bring your questions for the experts to address during the Q&A following the presentation.
WP 12 Proven IR Strategies
Download now to learn more.
WP Synful Knock
The initial infection vector does not appear to leverage a zero-day vulnerability. It is believed that the credentials are either default or discovered by the attacker in order to install the backdoor. However, the router's position in the network makes it an ideal target for re-entry or further infection. Read this Whitepaper to learn more.
WP How Secure Do You Want to Be
A resulting breach can be devastating, leading most organizations to re-evaluate their security program. Critically evaluating your security program in its entirety and looking for the areas it can be improved is a daunting task.