Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Security is an ever-evolving threat landscape. Even with the best in-breed security systems, there is still a possibility that your company is at risk. This whitepaper covers the 8 important things CIOs need to know about whaling and some useful tips they can use to protect their organisation from being held ransom to such attacks. Download whitepaper »
Cloud Security and Staff Security Training are the 2 biggest challenges facing Australian organisations in 2017, according to the CSO and Rapid 7 Vulnerability Management Survey. Download whitepaper »
Vulnerability management still wanting as Australian businesses struggle to stay ahead of security risks. Australian businesses are still suffering from deﬁcient vulnerability scanning practices, according to new survey data suggesting the industry is shifting away from implementing speciﬁc technologies and towards broader capabilities including cloud security and incident detection and response. Download whitepaper »