Technical Guide on Emerging Threats by Websense, Inc.Welcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
Technical Guide on Emerging Threats
by Websense, Inc.

> View this now

Published on: February 16, 2011
Type of content: EGUIDE
Format: Unknown
Price: FREE

Overview:

It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency. Today’s cybercriminals often have a long-term interest in their targets, and often employ social engineering to get inside a protected environment. Their tactics commonly include malicious payload that attempts to compromise the victim’s system and may continue spreading within the organization. They also increasingly focus on weaknesses at the application, rather than at system or network levels, to obtain data that provide the most value.


Defending IT infrastructure involves understanding attack tactics that are particularly effective today. As you assess and improve your information security program, consider the following characteristics of modern computer security threats and there recommendations for dealing with them.

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts