endpoint security: amplified

Final-Connect-Image.jpg

Worried about the next "Red October"?


Welcome to Day 1 of RSA Conference 2013!

During your time at the show, make sure to stop by the CounterTack booth (#2533) and see demonstrations of newly announced Deep System Inspection solutions:

- Next-generation honeynets

- Advanced attack analysis

- Production system monitoring

Additionally, you'll learn about new cyber counterintelligence research that led to the successful detection of "Red October."

Don't miss today's book signing event featuring Sean Bodmer, author of Reverse Deception: Organized Cyber Threat Counter-Exploitation today at 1:00 p.m. 

And after you check out our demo, you’ll be automatically entered to win a Vespa scooter – come see it at the booth!

Read More

Topics: Cyber Attack, Research, RSA

Dissecting Project Blitzkrieg

Reports of a massive, looming cyber attack – coined Project Blitzkrieg – has dominated headlines following the recent release of a new McAfee Labs study.

According to the report, malware has been lying dormant in 30 leading U.S. financial services organizations – including Fidelity, E*Trade, Charles Schwab, PayPal, Citibank, Wachovia, Wells Fargo, Capital One, Navy Federal Credit Union and others – and will be activated by the Spring of next year. The report goes on to say that “the project appears to be moving forward as planned.”

Read More

Topics: Cyber Crime, Cyber Security, malware, Cyber Attack, Research

New CounterTack Study: A Cyber-readiness Reality Check

We recently commissioned a study of information security executives to gauge the state of cyber-readiness inside the enterprise. Today, we’re unveiling the complete study findings, along with corresponding in-depth analysis by Richard Stiennon, chief research analyst of IT-Harvest.

Here’s a brief look at some of the study highlights, along with an infographic illustrating key data:

Read More

Topics: Cyber Security, Research, APT, Security Spending, Infographic

Intelligence-driven Information Security is Key to Combating APTs, Says Report

The future of battling advanced persistent threats will rely heavily on intelligence-driven information security, according to a new report from the Security of Business Innovation Council (SBIC), sponsored by RSA. 

Read More

Topics: Cyber Attack, Research, Breaches, Security Intelligence, RSA

Timing is Everything

Time is of the essence when it comes to cyber crime, and according the latest numbers, determined cyber criminals are willing to take plenty of it – patiently waiting, watching, finding, and ultimately, compromising your assets. In fact, according to Verizon’s 2011 Data Breach Investigations Report, the company indicates more than 60 percent of 2011 breaches happened over a span of “months or longer before discovery.” That’s a long while for an intruder to spend casing the joint. By the time he’s ready to move on, no doubt he’s had enough time to uncover your organization’s most critical assets.

Read More

Topics: Cyber Crime, Research, Breaches, Zero-day Attack, Security Intelligence, Virtualization

Subscribe to Email Updates

Posts by Topic

see all