This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Infosec 2013: APTs are hard to defend against, but not impossible

Share this article:

Modern security technologies are not meant to stop advanced persistent threats (APTs), but organisations do not have to bury their heads in the sand.


Speaking at the Infosecurity Europe exhibition in London, Brian Laing, director of marketing and products at AhnLab, said that security tools are "not meant to block these types of attacks" and that while attackers can sell attacks for tens of thousands of pounds on the black market, organisations are not lost.


He said: “An attack could be with an attachment, with a drive-by download or with an infected website, or they could just infect your machine. You cannot do detection with signatures, so you have to dig down and look at the file and find out what it is doing.”


Speaking earlier in the day, Matthew Bennett, cyber incident response analyst at Cassidian CyberSecurity, said that attackers "are not trying to get a talk at Blackhat; they will use the minimum effort to achieve their goals".


He encouraged eradicating attackers by shutting down communication channels, enhancing a company's security posture and assuming that the attacker has access to the full environment. He said: “The attacker has an effective attack strategy, but they are not the only one. Yours can be the same, so do not bury your head in the sand when it comes to a reaction.


“Look at whitelisting, deprovision accounts, user awareness in protecting your account, as they are the first to be targeted. Have a surveillance strategy, have a response strategy and when intrusions take place, be the first to know.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Russian government promises £60k bounty to Tor hackers

Russian government promises £60k bounty to Tor hackers

The Russian Ministry of Internal Affairs (MVD) is offering a 3.9 million ruble (approximately £64,600) reward to anyone who can find a way of identifying and tracking users of the ...

UK watchdog warns firms on Big Data risks

UK watchdog warns firms on Big Data risks

UK watchdog The Information Commissioner's Office (ICO) has released a comprehensive report into big data which warns companies that their data analytics activities must adhere to existing data protecting laws.

4% of Googlebots are fake and can launch attacks

4% of Googlebots are fake and can ...

Admins' fear of damaging their SEO gives malicious search engine bots a 'VIP pass' into sites.