This paper follows the monitoring and analysis of malicious cyber threats using research, digital forensics and post event analysis to build a global view of the threats, vulnerabilities and trends. •Malicious actors are now switching tactics to build, deploy and conceal powerful botnets •DDoS attack activity and sizes have remained elevated throughout the first half of 2014 •Malicious actors were able to generate large attack sizes by employing reflection and amplification techniques
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem
With so much change all the time, how can executives best prepare their businesses to meet the security challenges of the coming years? CSO Australia, in conjunction with Mimecast, explored this question in an interactive Webinar that looks at how the threat landscape has evolved – and what we can expect in 2019 and beyond.
An interview with CSO's David Braue and Ian Yip, Chief Technology Officer, McAffee.