• Home
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
  • Events
  • Whitepapers
  • Newsletters
  • Sign in
  • Events
    • Follow V3 Events

      Sign up to receive email alerts about our events

      Sign up
  • Whitepapers
    • V3resources 120x194
      Network Security Forensics For GDPR Compliance

      An effective network security forensics strategy can assist an organization in providing key compliance-related details as part of any post-incident GDPR investigation.

      Download
      V3resources 120x194
      10 ways to increase productivity with managed Office 365

      For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Data Strategy Spotlight
  • Sign in
  •  
    •  

      You are currently accessing V3 .co.uk via your Enterprise account.

      Personalise your on site experience

      Download and use the apps

      Access your subscription from outside of the office

      Get relevant news and insight straight to your inbox

      • Sign in
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • News
  • Reviews
  • Digital technology
  • Cloud
  • Data analytics
  • Digital leaders
  • IoT
  • Opinion
 
  •  

    You are currently accessing V3 .co.uk via your Enterprise account.

    Personalise your on site experience

    Download and use the apps

    Access your subscription from outside of the office

    Get relevant news and insight straight to your inbox

    • Sign in
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
V3.co.uk
  • Security

Security chiefs must assume they've already been targeted by advanced persistent threats

Just a matter of time for most organisations, experts warn

Computer security
  • Phil Muncaster
  • Phil Muncaster
  • 03 August 2011
  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
0 Comments

A group of information security leaders convened by RSA Security has warned chief information security officers (CISOs) that defending against advanced persistent shreats (APTs) requires a new mindset based on the assumption that they have already been compromised.

The report, When Advanced Persistent Threats Go Mainstream, is the latest in a series from the Security for Business Innovation Council, which features CISOs from ABN Amro, eBay and EMC and others.

It sets out to chart how APTs have moved from mainly nation state authored attacks targeting the defence sector to represent a threat to all organisations from cyber criminals and even hacktivists.

According to the report, the term APT has come to mean a well researched and funded attack targeted at a specific organisation "employing multiple vectors and using 'low and slow' techniques to evade detection".

The Operation Aurora attacks on Google and other organisations in 2009, as well as the Night Dragon attacks discovered by McAfee, could both be described as APTs.

Given the nature of these threats and their intention to evade traditional security filters, the report warns that for most organisations it is a case of if and not when they will be targeted.

It makes seven key recommendations beginning with improving intelligence gathering and analysis, installing intelligent network monitoring tools, tightening user access controls and improving user education to ensure that staff can spot social engineering.

CISOs are also encouraged to share intelligence with their peers, and rearchitect their IT systems, isolating critical assets to make it harder for attackers to roam networks in search of key information.

The report is well-timed, coming out as McAfee revealed yet another large-scale, well funded and researched cyber attack, which lasted over five years, dubbed Operation Shady RAT.

However, many will question the suitability of RSA to publish research and recommendations on APTs, given that the firm itself succumbed to a high-profile attack on its systems in March forcing it to offer all its customers replacement SecurID tokens.

  • Tweet  
  • Facebook  
  •  
  •  
  • Send to  
  • Topics
  • Security
  • Hacking
  • RSA
  • Data Loss

V3 Latest

First plant to grow on the Moon, err, dies
First plant to grow on the Moon, err, dies

Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night

  • Communications
  • 18 January 2019
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData
Fortnite news and updates: Fortnite made $2.4bn in 2018, according to SuperData

Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018

  • Software
  • 18 January 2019
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand
Japanese firm sends micro-satellites into space to deliver artificial meteor showers on demand

Meteor showers as a service will be visible for about 100 kilometres in all directions

  • Communications
  • 18 January 2019
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data

New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago

  • Communications
  • 18 January 2019
Back to Top
  • Contact
  • Marketing solutions
  • Enterprise IT Events
  • About
  • Terms & conditions
  • Privacy policy
  • RSS
  • Twitter
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017