sb-as logo
Story image

How to keep your company safe from complex cyber threats

An advanced persistent threat (APT) is a set of stealthy and continuous computer hacking processes, often orchestrated by criminals targeting a specific entity. 

These threats often include unknown and undocumented malware, including zeroday threats.

They are designed to be evolving, polymorphic and dynamic.

Very often they are targeted to extract or compromise sensitive data, including identity, access and control information. 

While these types of attacks are less common than automated or commoditised threats that are more broadly targeted, APTs pose a serious threat.

To better detect APTs, security professionals are deploying advanced threat detection technologies, often including virtual sandboxes that analyse the behaviour of suspicious files and uncover hidden, previously unknown malware. 

However, threats are getting smarter, and many vendors’ sandbox techniques simply have not kept up.

Thus, it is a smart idea to prepare for the likely scenario that your firewall sandbox is vulnerable. 

SonicWall has you covered with their latest whitepaper, 5 Ways your Firewall Sandboxes can Fail.

This paper looks at the major vulnerabilities of firewall sandboxes and how you can prevent a major system breach.  

Story image
Users becoming more savvy with COVID phishing scams
“With COVID-19 being around for over a year now and employees becoming more aware of the types of scams that have come out related to the pandemic, cyber criminals are having less success with related phishing attacks."More
Story image
AvePoint brings Salesforce Cloud Backup to channel partners
The product adds to the AvePoint suite of trusted Cloud Backup for Microsoft 365 and Dynamics 365 to provide managed service providers with backup and restore capabilities across multiple, popular SaaS providers.More
Story image
97% of organisations experienced a mobile threat in 2020 — report
93% of these attacks originated in a device network, which includes attempts to trick users into installing a malicious payload via infected websites or URLs, or to steal users’ credentials.More
Story image
Why a more secure organisation is a collective responsibility
With vast volumes of data moving to the cloud, many IT professionals are frequently challenged to protect their enterprise environment, and there is a greater focus being placed on advancing cybersecurity strategies.More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
Dell Technologies unveils new data protection innovations for hybrid cloud workloads
The Dell EMC PowerProtect Backup Service, powered by Druva, is designed to deliver SaaS app protection without increasing IT complexity.More