This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Infosec 2013: APTs are hard to defend against, but not impossible

Share this article:

Modern security technologies are not meant to stop advanced persistent threats (APTs), but organisations do not have to bury their heads in the sand.

 

Speaking at the Infosecurity Europe exhibition in London, Brian Laing, director of marketing and products at AhnLab, said that security tools are "not meant to block these types of attacks" and that while attackers can sell attacks for tens of thousands of pounds on the black market, organisations are not lost.

 

He said: “An attack could be with an attachment, with a drive-by download or with an infected website, or they could just infect your machine. You cannot do detection with signatures, so you have to dig down and look at the file and find out what it is doing.”

 

Speaking earlier in the day, Matthew Bennett, cyber incident response analyst at Cassidian CyberSecurity, said that attackers "are not trying to get a talk at Blackhat; they will use the minimum effort to achieve their goals".

 

He encouraged eradicating attackers by shutting down communication channels, enhancing a company's security posture and assuming that the attacker has access to the full environment. He said: “The attacker has an effective attack strategy, but they are not the only one. Yours can be the same, so do not bury your head in the sand when it comes to a reaction.

 

“Look at whitelisting, deprovision accounts, user awareness in protecting your account, as they are the first to be targeted. Have a surveillance strategy, have a response strategy and when intrusions take place, be the first to know.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Microsoft warns on yet another zero-day security flaw

Microsoft warns on yet another zero-day security flaw

Microsoft has warned Windows users about a zero-day security issue with malicious PowerPoint documents being emailed to recipients. The software giant is working on a patch for the problem.

Google launches FIDO-compliant 2FA USB key for Chrome and Gmail

Google launches FIDO-compliant 2FA USB key for Chrome ...

Google has souped up its two-factor authentication (2FA) login process with the launch of Security Key, a physical USB that only works after verifying the login site is truly a ...

Evolving TorrentLocker ransomware generating big money

Evolving TorrentLocker ransomware generating big money

The TorrentLocker ransomware has returned with a vengeance and is starting to bring in big money for its operators.