IP Products

Cyber-attack e-book

by msecadm4921

An information security product company has launched its e-Book, “Don’t Give Cyber-Attackers the Privilege”, and Infographic. These two resources examine the nature of cyber-attacks, says Cyber-Ark Software, and provide best practice guidance on how to mitigate against this threat.

 

 

The firm says that the last 18 months have seen a significant rise in the number of targeted cyber attacks making the news. Indeed, according to the Ponemon Institute, 2011 saw a record number of attacks on corporations, costing them more than 56pc than they did in 2010. Throughout the array of these incidents – from SONY to SCADA, crafted malware to sophisticated cyber-attacks – privilege has been a fundamental, as well as a recurring, theme.

 

Privileged accounts are the most powerful within an organisation, allowing a privileged ‘super’ user to log on anonymously and have complete access to all of the information on the target system. As such, they have come to be of particular interest for attackers – who see the potential to obtain often anonymous access to highly valuable assets.

 

The new e-Book has been developed to discuss this very issue, describing some of the major breaches of privileges that have hit the headlines, and offering insight into how cyber-attackers operate. By analysing the role that privilege and privileged accounts play in each of these attacks, the e-Book outlines the key steps that organisations can take to effectively protect these accounts, as well as how to ultimately defend the corporate network.

 

“Our new e-Book really tells the story of the evolution of cyber-attacks and earmarks the defining characteristics of today’s attacker,” said Roy Adar, Vice President of Product Management at Cyber-Ark Software. “When paired with the Infographic, which provides users with a snapshot view of the problem, we hope to arm organisations with a much valued resource, helping to guide them through the mine-field of security, and ensuring that all the right tools are being used to guard systems appropriately.”

 

At Infosecurity Europe 2012 (24 – 26 April)  Cyber-Ark’s Director of UK and Ireland, Mark Fullbrook, was presenting a seminar at the event, titled “Analysing the DNA of Privileged Accounts” on the Tuesday. Both documents are available for download. The e-Book can be accessed here (http://www.cyber-ark.com/cyberattacks) and the Infographic downloaded here (http://www.cyber-ark.com/ebooklanding/infographic.html).

Related News

  • IP Products

    SA IP install

    by Mark Rowe

    Hikvision, the Chinese video surveillance product company, and their South African partner Sensor Security, have completed an IP CCTV system to protect…

  • IP Products

    Storage server

    by msecadm4921

    The GeViStore-IP/16Bay-2P is Geutebruck’s latest redundant dual-processor storage server system for IP applications requiring high performance and high survivability.  This is described…

  • IP Products

    Online ordering upgrade

    by Mark Rowe

    Mayflex, the Birmingham-based distributor of networked and IP security, cabling and other products has upgraded its online ordering, XTRA. That’s the partner…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing