White Papers

Data Protection & the Insider Threat: A Veriato Paper Featuring Insights by Gartner Research - spons
Data Protection & the Insider Threat: A Veriato Paper Featuring Insights by Gartner Research - sponsored

This 22-page document contains Gartner Research’s Market Guide for User and Entity Behavior Analytics (UEBA). User and Entity Behavior Analytics has emerged as a critical part of a robust information security strategy, enabling the detection of threats that would otherwise go undetected. 

The barrage of data breaches and thefts caused by actual insiders, and by external actors impersonating insiders via compromised credentials, has led many to seek new approaches to increase their ability to protect sensitive data and intellectual property.  

Gain understanding of the UEBA marketplace, and of the Veriato approach and how it can benefit your organization.


Attack Campaigns: Connecting the Dots to Disrupt the Adversary
Attack Campaigns: Connecting the Dots to Disrupt the Adversary - sponsored

Adversaries have patience and expect to persevere over any and all obstacles that stand in front of them. Their toolkit is not limited and if at first they don’t succeed they’ll try again until they complete their mission. The enterprise’s challenge: find and disrupt them before they fulfill their mission and prepare for the next one, never relinquishing their hold.

Cybersecurity threats to the enterprise continue to move at a pace whereby many organizations are not able to keep up with the known, let alone advanced adversarial tactics. For years the industry has concluded that advanced attacks involve some sort of malware in order to be successful. While malware can be used to exploit a target, there’s an evolution occurring that extends beyond the need for malware or zero-day exploits: attack campaigns. An attack campaign is not just an opportunistic attack aiming to compromise an endpoint, but rather a deliberately focused effort with a specific motive and mission with the intention to persevere until the campaign’s successful conclusion. 


User Authentication Gets Flexible - sponsored

It’s no secret, password secrets haven’t held up for quite some time against attacks targeting consumers and enterprise organizations.

Breach after breach, credential compromise seems to be the path of least resistance. Why bother attempting to exploit a remote server against an unknown or even known vulnerability, when phishing a human will do just fine?

Open, click, and enter credentials – it doesn’t get any easier for an attacker. To make matters worse, the universal password is just that, it is universally re-used oftentimes across multiple sites.

Harvest one set of credentials and chances are good it is re-used elsewhere. Time and time again this has been increasingly clear through interacting with everyday people who are the end users within our corporations.

With dozens and dozens of different sites requiring a login, can you blame them for using weak or the same password across personal and corporate accounts? How many sites do you have to remember passwords for as a security professional?

This White Paper reviews how security and convenience have historically been at polar opposites. It examines Authentify xFA™ which bridges the gap between convenience and strong authentication. 


Analysis: How Russia Stole Access to Over 500k Bank Accounts - sponsored paper
Analysis: How Russia Stole Access to Over 500k Bank Accounts - sponsored paper

Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials in the United States and Europe.

In this exposé, researchers provide a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled the cybercrime group to infect over 500,000 PCs. You’ll read how:

•          A Russian-speaking cybercrime group targeted primarily US-based systems and online banking accounts.

•          Accounts at five of the largest US banks were exposed by the Qbot Botnet that sniffed conversations of some 800,000 online banking transactions.

•          Attackers compromised WordPress sites and how they used many of the sites to distribute infected content.

•          Windows XP clients, who no longer receive patch and update support, comprised 52% of the infected systems.

•          The cybercrime group used compromised PCs, turning them into illicit ‘private clouds’ and infiltration points, to offer a sophisticated paid proxying service for other organized crime groups. 


Vulnerability Management Solutions Are Flawed - sponsored paper
Vulnerability Management Solutions Are Flawed - sponsored paper

Many organizations are unknowingly at risk of a devastating security breach.

Why? A false sense of security and misplaced faith in highly touted continuous scanning and monitoring tools. Today’s Enterprise organizations are being misled with regard to their security risk exposure, and are in serious danger of becoming victims of security breach events. The vulnerability management (VM) solutions and products that are central to every Enterprise information security program, and which are essential in gauging network security information risk, contain a serious “hidden” flaw which is now beginning to come to light.

Gordon MacKay, Digital Defense, Inc. (DDI) Chief Technology Officer, has released the white paper, Vulnerability Management Solutions are Flawed, Leaving your Enterprise at High Risk, that shows how the lack of proper advanced network endpoint correlation technology (reconciliation) may generate an inaccurate view of the organization’s security posture and create the opportunity for a devastating breach.

View the Infographic


The Hunter Becomes the Hunted - sponsored paper
The Hunter Becomes the Hunted - sponsored paper

As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. What if security teams seek out the attacker as opposed to waiting for them to slip up and trip an alert?

With motivated attackers penetrating successfully, security leaders are creating internal teams of hunters to locate the attacker and to eradicate them as quickly as possible. This is a change in mindset from the way teams have long been accustomed to identifying incidents.

The simple fact of the matter is that attackers are
 penetrating networks and advanced security teams have begun to recognize the need to
 move from sitting and waiting to going on the hunt for the attacker.

This white paper explains how the hunter becomes the hunted and how Arbor Networks’ Pravail® Security Analytics empowers security teams to have a fighting chance defending the enterprise. To be successful at hunting for an attacker, security teams need visibility, speed, accuracy and analysis across historical and real-time data.


Achieving Trust After a Breach: "Which Systems Can I Trust?" - sponsored paper
Achieving Trust After a Breach: "Which Systems Can I Trust?" - sponsored paper

When an organization has been compromised, some of the first questions to ask are critical: 

  • “Which systems can I trust?” 
  • “What was done to compromise my systems or data?” 
  • “How quickly can I figure out where I stand?” 

Tripwire is often contacted after the fact to help answer these all-to-common questions. 

This paper explains the five steps an organization can take, even if they haven't previously installed Tripwire Enterprise, to restore trust in their enterprise following a breach.  

The Human Factor: Gain new insight into the ways attackers exploit end-users' psychology​​

About Security Current | Privacy Policy | Subscribe to our newsletter