Story image

How to stop 'sleeper-agent' hackers from causing havoc

24 Jan 18

It’s no secret that organisations are facing a much more comprehensive threat landscape, and keeping sensitive data secure is harder than ever.

A big problem often lies with hidden entities infiltrating the network, without anyone's prior knowledge, eventually resulting in huge amounts of compromised data and loss of resources.

For this reason, cybersecurity strategies have been steadily shifting away from prevention and towards threat-detection and response, with Gartner predicting that 60% of enterprise information security budgets will be allocated to rapid detection and response approaches, up from less than 20% in 2015.

The fundamental goal of these strategies is to detect and respond threats at the earliest possible time before the damage is done.

One way to accomplish this is through the use of Threat Lifecycle Management (TLM), which is a series of aligned security operations capabilities and processes that allows organisations to “see” broadly and deeply across entire IT environments.

LogRhythm has developed a guide on how TLM effectively leverages things like machine learning, automation and analytics to more quickly and comprehensively detect and respond to a vast multitude of threats.  

A Threat Lifecycle management platform that uses strong automation, in a unified platform, will ensure that your staff can work more efficiently to achieve reduced detection and response times, which will ultimately lead to less stress and more savings.

How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).
'DerpTrolling’ faces jail time for Sony DoS attacks
A United States federal court has charged a 23-year-old man for the hacks on Sony Online Entertainment and other major companies back in 2014.
It's time to rethink your back-up and recovery strategy
"It is becoming apparent that legacy approaches to backup and recovery may no longer be sufficient for most organisations."