Cybersecurity’s Maginot Line: A Real-World Assessment of the Defense-in-Depth Model

This first-of-its-kind study examines data from more than 1,600 FireEye network and email appliances in real-world settings. The FireEye devices were part of more than 1,200 “proof-of-value” trials in actual deployments, where they sat behind other defensive layers but were not set to block malicious activity. That unique vantage point revealed a deeply flawed defense-in-depth model.

The study gets its title from France’s famed Maginot Line — the technically impressive 940-mile border defense that Germany simply bypassed with a novel blitzkrieg style of warfare. Like the Maginot Line, today’s cyber defenses are fast becoming a relic in today’s threat landscape. Organizations spend billions of dollars every year on IT security. But attackers are easily outflanking these defenses with clever, fast-moving attacks.
Get Whitepaper

Hacking The Street? FIN4 Likely Playing The Market

Operating since at least mid-2013, FIN4 distinctly focuses on compromising the accounts of individuals who possess non-public information about merger and acquisition (M&A) deals and major market-moving announcements, particularly in the healthcare and pharmaceutical industries. FIN4 has targeted individuals such as top executives, legal counsel, outside consultants, and researchers, among others.

Our visibility into FIN4’s activities is limited to their network operations; we can only surmise how they may be using and potentially benefiting from the valuable information they are able to obtain. However one fact remains clear: access to insider information that could make or break stock prices for over 80 publicly traded companies could surely put FIN4 at a considerable trading advantage.

Download the report to:
  • Find out the types of companies FIN4 has targeted and the information they're after
  • Learn about the techniques used to compromise key executive email accounts
  • Discover the mechanisms FIN4 uses to organize the data they collect and the steps used to evade detection
  • Understand the preventative measures that can be taken to avoid similar attacks
Get Whitepaper

The Numbers Game: An In-Depth Look at Alert Management in Europe

This report details the survey results of all aspects of alert management in Europe – covering where alerts originate, how they’re categorized, and how they’re managed – and how the process can increase the likelihood of a breach being successful.

Download the report and learn:
  • Why alerts are not fool-proof
  • Why having more consoles may not be the answer to your security needs
  • How your IT team may not be prepared to handle critical alerts
  • How long it takes other organizations to respond to alerts, and how you compare
  • Why outsourcing could save you money and mitigate risk
Get Whitepaper

HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group

It hides in network communications, in all the noise—designed so that defenders can neither detect nor characterize its activity. But its purpose is transparent: to use Twitter, GitHub, and cloud storage services to relay commands and extract data from compromised networks.

Download the report and read about the recently discovered HAMMERTOSS, a malware backdoor created by the Russian advanced persistent threat (APT) group APT29.
Get Whitepaper

2015 Cyberthreat Defense Report

What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security? Read the “2015 Cyberthreat Defense Report” to learn what matters most to the over 800 North American and European IT security decision makers surveyed.
Get Whitepaper

Understanding Verification, Validation and Certification

Cybersecurity and communication robustness have become increasingly bigger concerns as technology has continued to improve and systems have become more complex. Each attempt to expand the networking and communication capabilities of devices have brought new features and convenient solutions for end users, along with new security and robustness challenges.

Synopsys solutions help deliver a more comprehensive security offering for the SDLC by adding black box testing capabilities, including the Codenomicon Defensics® tool for file and protocol fuzz testing, and the Codenomicon AppCheck™ tool for software composition analysis and vulnerability assessment.

Get Whitepaper

Website Security Threat Report Part 3

We hope you enjoyed parts 1 and 2 of the Symantec WSTR 2015. Now download part 3 to discover how the public made criminal's lives easier in falling for the latest social media attacks and online scams.

Plus, take an invaluable look ahead and benefit from our security recommendations and best practices.
Get Whitepaper

Website Security Threat Report Part 2

We hope you enjoyed part 1 of the Symantec WSTR 2015. Now download part 2 for the latest on the fast-evolving world of targeted attacks - from cyber espionage tactics to denial of service, spear-phishing and watering hole attacks.
Get Whitepaper

Website Security Threat Report Part 1

Stay up-to-date with Symantec's WSTR 2015: Your 3-Part report to the world's current and emerging website security threats. Packed with valuable insights and statistics, it's all you need to know about the threats that impact your online business world.
Get Whitepaper

The Top 10 TLS/SSL Client, Server, and Application Best Practices

Ensure that you are using TLS/SSL certificates in the most secure manner. Read this whitepaper for an in-depth breakdown of the top 10 TLS/SSL client, server and application best practices.

This whitepaper covers how to ensure that:
• Security software and settings on your web server are up-to-date.
• Your Internet browser and client are up-to-date.
• Your client computers are free of malware.
• You keep an eye on the expiry date of your TLS/SSL certificates and replace them quickly.
Get Whitepaper

Hidden Dangers Lurking in E-Commerce: Reducing Fraud with the Right SSL Certificate

E-commerce has grown at exponential rates in the past decade, with consumers quickly recognizing the convenience of purchasing goods online. This growth in online purchases rests upon a foundation of trust. People trust that the websites they use to track finances and make online purchases are secure and legitimate largely because of Secure Socket Layer (SSL) certificates.

SSL certificates verify that the provider is who they claim to be and also indicate secure connections between personal devices and company websites. There are three types of SSL certificates, each requiring a different level of authentication: DV, OV and EV.

Understanding the differences among each SSL certificate type is important to help prevent falling victim to scammers. For example, DV certificates are quick and easy to procure and don't require any type of information indicating the person trying to get the DV certificate actually represents a legitimate business. Fraudsters often use DV certificates to lure consumers to phishing websites that look authentic but are designed to steal sensitive information. For this reason, doing any type of ecommerce transaction on a DV-only site poses risk.

Online shopping isn't going away. Until the industry requires an OV or EV certificate for e-commerce sites or an easier way to identify the types of certificates, consumers will have to bear some of the burden of combating cyber risks. Knowing the risks ahead of time, however, is half the battle.
Get Whitepaper

Six Golden Rules for Selecting an SSL or TLS Certificate

The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection.

Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly.

When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules.

At the end of the day, people want to make sure their Web sites are secured with as little friction as possible - Symantec gives businesses every opportunity to achieve that goal.
Get Whitepaper

Raise Your Google Ranking

To help create a more secure web, Google now gives HTTPS-secured sites an SEO (Search Engine Optimization) boost to help safer sites become popular sites.

Learn more about this and other ways to boost your ranking in this white paper.
Get Whitepaper