News
Teri Robinson,
Oct 18, 2017
In 2013 Microsoft discovered that hackers had breached the secret internal database it uses to track vulnerabilities, it then quietly upped its security, segmenting the database from its network and compelling two-factor authentication.

Executive Insight

Opinion
Oct 18, 2017
When it comes to cyber-security, the problem is that while businesses and IT leaders are prioritising cyber-security investment, the investment in that security has always been responsive, rather than preventative says Steve Inglessis.

SC Webcasts

Vendor Webcast

2017 State of Cybercrime Report Webcast

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.”

x

2017 State of Cybercrime Report Webcast

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.

In our “2017 State of Cybercrime” report, we shared several key findings and intelligence which stems from the visibility gained from criminal forum monitoring, our thousands of clients, the machine learning and automation from our industry-leading Counter Threat Platform™, and the actionable insights from our team of elite Counter Threat Unit™ (CTU) researchers, analysts and consultants.

Secureworks Counter Threat Unit Senior Security Researcher, Mike McLellan, will analyse the key findings from our research and will cover recommended strategies for organisations to pursue in order to prevent, detect, respond to and predict the latest cybercriminal activity threats.

During this live webcast we will cover:

  • Key findings from our visibility into criminal forums and technical monitoring of global criminal activity
  • Cybercrime categories and the significant risk to individuals and organisations
  • The complexity of the criminal landscape and diverse capabilities of threat actors
  • The continuation of online crime as a market economy
More Info

Sponsored by: SecureWorks

Vendor Webcast

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according...

x

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.

Organisations can suffer from a false sense of security thinking they’re better protected than organisations running fewer security products. But in fact, it could be quite the opposite. Much like the law of diminishing returns, the more products, the more alerts, and the more alerts, the higher your chances are of wasting time investigating the same threat more than once—keeping you from focusing on other, more critical threats.

Join Golan Ben-Oni, Global Chief Information Officer at IDT Corporation, and Gil Barak, Co-Founder and Chief Technology Officer at Secdo, as they show you how alerts can be streamlined to simplify threat hunting and find what would have otherwise been overlooked by other tools. Attendees will learn:

  • What is threat-level visibility and how it gives you a far more granular view into potential threats than user-level or kernel-level access to endpoint activity ever could
  • What steps can be taken to automate and simplify alert analysis to eliminate time spent chasing down redundant alerts and false positives
  • How to optimise your security workflow following an incident
More Info

Sponsored by: Secdo

Director's Cut

Features

PRODUCT REVIEWS

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...

Nyotron PARANOID

Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.

Whitepapers

Rethink DNS

Download this eBook to discover smarter ways to use DNS to optimize performance, build resiliency and manage traffic across hybrid cloud environments.

Understanding and Mitigating DDoS Attacks

Download this whitepaper to learn the critical role DNS plays in the performance of your online business, common types of DDoS attacks, and best practices for protecting DNS infrastructure...

Managed DNS Evaluation Guide

Download this guide to learn how a cloud-based DNS service can help you improve business results and provides guidelines for choosing a managed DNS service provider.

High Availability DNS

Global DNS performance is critical to user experience, but many businesses rely on a DNS solution that lacks global scale and resiliency. Download this whitepaper to learn the advantages...

GET SC MEDIA UK DELIVERED TO YOUR INBOX