This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Infosec 2013: APTs are hard to defend against, but not impossible

Share this article:

Modern security technologies are not meant to stop advanced persistent threats (APTs), but organisations do not have to bury their heads in the sand.

 

Speaking at the Infosecurity Europe exhibition in London, Brian Laing, director of marketing and products at AhnLab, said that security tools are "not meant to block these types of attacks" and that while attackers can sell attacks for tens of thousands of pounds on the black market, organisations are not lost.

 

He said: “An attack could be with an attachment, with a drive-by download or with an infected website, or they could just infect your machine. You cannot do detection with signatures, so you have to dig down and look at the file and find out what it is doing.”

 

Speaking earlier in the day, Matthew Bennett, cyber incident response analyst at Cassidian CyberSecurity, said that attackers "are not trying to get a talk at Blackhat; they will use the minimum effort to achieve their goals".

 

He encouraged eradicating attackers by shutting down communication channels, enhancing a company's security posture and assuming that the attacker has access to the full environment. He said: “The attacker has an effective attack strategy, but they are not the only one. Yours can be the same, so do not bury your head in the sand when it comes to a reaction.

 

“Look at whitelisting, deprovision accounts, user awareness in protecting your account, as they are the first to be targeted. Have a surveillance strategy, have a response strategy and when intrusions take place, be the first to know.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Banking Trojans target energy sector as APTs

Banking Trojans target energy sector as APTs

Banking Trojans are increasingly being used to launch advanced APT attacks, says IBM Trusteer, which has revealed a recent attack on several petrochemical companies in the Middle East using Citadel ...

Britain's small cyber security firms get £4m boost

Britain's small cyber security firms get £4m boost

Business secretary Vince Cable has launched a new £4 million government competition to help the UK's small cyber security businesses find new ways to combat the cyber threat.

GCHQ 'spied on Germany's Deutsche Telekom'; Germans sell spyware

GCHQ 'spied on Germany's Deutsche Telekom'; Germans sell ...

UK and US spies reported to spy on Deutsche Telekom in Snowden documents, while Germany's FinFisher accused of supplying surveillance software to repressive regimes.