All Blog Posts Tagged 'Malware' (4)

7 Tips A CISO Should Know To Implement Endpoint Protection & IT Asset Management

This project mainly aims to have an enterprise wide ITAM (IT Asset Management) Systems and endpoint protection and also to maintain the hardware and software inventory. It also brought in centralized IT management and control mechanisms for polices enforcement, monitoring and reporting to present a complete picture of endpoint status of the organization.

(Read more:  …

Continue

Added by pritha on October 21, 2014 at 2:30pm — No Comments

How Should a CISO choose the right Anti-Malware Technology?

Now this is a very subjective term as “Right” to each is quite different. More so, the subject “Information Security” by itself is quite a dynamic and an evolving term. Here, any measure stick with constant attributes may not provide a true insight for the choice of Technology. However, certain parameters of the selection process can be generalized for operational efficiency.

(Read more: …

Continue

Added by CISO Platform on August 27, 2013 at 4:30pm — No Comments

APT Secrets that Vendors Don't Tell

APT (Advanced Persistent Threats) is the talk of the town. There is too much of noise and confusion. Everybody wants to make money. Quite a few uses FUD (Fear Uncertainty and Doubt) to sell their products. I wanted to highlight the APT secrets which vendors don't tell (well mostly).

 

There is no single solution for APT

APT is a like a war. No single solution is good enough. You cannot have a solution to your APT problem.…

Continue

Added by bikash on April 20, 2013 at 10:30am — No Comments

Anti-Virus… or Door for a hacker?

How hackers can break into your system through anti-virus?
 
Step 1: Hacker does remote identification of antivirus - Some company Inc is running an antivirus in its mail server. The antivirus checks for every incoming mail for possible virus infection. If the mail is clean, the antivirus passes it and the mail is then forwarded to recipient. Else the mail gets dropped or rejected. The first step of an attacker is to…
Continue

Added by CISO Platform on July 5, 2012 at 4:00pm — No Comments

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service