Security Series #4: The Threat Landscape – Targeted Attacks explained- Top 3 Mitigations – Top 5 aspects of incident preparation

Targeted attacks are an evolution of espionage to target a specific organization in order to steal information, modify information, or destroy information or systems. On the other hand, opportunistic attacks (see previous post) target a specific technology without caring about who uses it. Targeted attacks are technology agnostic as the attackers have the resources and…

0

Security Series #3: the threat landscape – opportunistic attacks from Microsoft Security Intelligence Report v14

Microsoft has recently published the latest version of the Security Intelligence Report v14 (http://microsoft.com/sir) focusing on software vulnerabilities, software vulnerability exploits, and malicious and potentially unwanted software during the third and fourth quarter of 2012. Please allow me to share a few highlights from the report. Use an up-to-date antimalware Computers with a real-time antimalware…

0

Security Series #2: How to Bake Security in Products and Services? SDL.

Engineering more secure software with the Microsoft Security Lifecycle (SDL) In January 2002, Bill Gates launched the Microsoft Trustworthy Computing Initiative which focused on security as one of its four pillars. One of the big achievements of this initiative was the creation and evolution of the Microsoft Security Development Lifecycle or SDL, a comprehensive approach…

0

Security Series #1: Principles of Cyber Security

Today I’m starting a series of blog posts on cyber security. Before getting to various topics, I thought it could be useful to remind everyone some of the security principles that are the most useful to help you achieve a higher level of security, whichever technology you’re going to use. Core attributes of cyber security:…

0