IP Products

Cyber-attack e-book

by msecadm4921

An information security product company has launched its e-Book, “Don’t Give Cyber-Attackers the Privilege”, and Infographic. These two resources examine the nature of cyber-attacks, says Cyber-Ark Software, and provide best practice guidance on how to mitigate against this threat.

 

 

The firm says that the last 18 months have seen a significant rise in the number of targeted cyber attacks making the news. Indeed, according to the Ponemon Institute, 2011 saw a record number of attacks on corporations, costing them more than 56pc than they did in 2010. Throughout the array of these incidents – from SONY to SCADA, crafted malware to sophisticated cyber-attacks – privilege has been a fundamental, as well as a recurring, theme.

 

Privileged accounts are the most powerful within an organisation, allowing a privileged ‘super’ user to log on anonymously and have complete access to all of the information on the target system. As such, they have come to be of particular interest for attackers – who see the potential to obtain often anonymous access to highly valuable assets.

 

The new e-Book has been developed to discuss this very issue, describing some of the major breaches of privileges that have hit the headlines, and offering insight into how cyber-attackers operate. By analysing the role that privilege and privileged accounts play in each of these attacks, the e-Book outlines the key steps that organisations can take to effectively protect these accounts, as well as how to ultimately defend the corporate network.

 

“Our new e-Book really tells the story of the evolution of cyber-attacks and earmarks the defining characteristics of today’s attacker,” said Roy Adar, Vice President of Product Management at Cyber-Ark Software. “When paired with the Infographic, which provides users with a snapshot view of the problem, we hope to arm organisations with a much valued resource, helping to guide them through the mine-field of security, and ensuring that all the right tools are being used to guard systems appropriately.”

 

At Infosecurity Europe 2012 (24 – 26 April)  Cyber-Ark’s Director of UK and Ireland, Mark Fullbrook, was presenting a seminar at the event, titled “Analysing the DNA of Privileged Accounts” on the Tuesday. Both documents are available for download. The e-Book can be accessed here (http://www.cyber-ark.com/cyberattacks) and the Infographic downloaded here (http://www.cyber-ark.com/ebooklanding/infographic.html).

Related News

  • IP Products

    Single-sensor cameras

    by Mark Rowe

    New from Arecont Vision Costar, the IP-based megapixel camera manufacturer, are ConteraIP single-sensor cameras. The four new bullet and dome models are…

  • IP Products

    Aimetis agreement

    by Mark Rowe

    Security Buying Group, already the UK agent for Grundig, has a supply agreement with Aimetis, an IP video management software (VMS), video…

  • IP Products

    Network mini PTZs

    by Mark Rowe

    Dahua Technology, the Chinese manufacturer and supplier of video surveillance products based in Hangzhou, has introduced its 2-inch network mini PTZ series…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing