Posts Tagged 'computer security'

The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which creates significant problems for organizations seeking to optimize their risk posture. To properly prioritize security investments, it is crucial to understand the overall risk of loss. Although managing security is complex, the principles of determining […]

This post, the second of two parts, was written by Christiaan Beek, Raj Samani, and Shane Shook.  In our first post, we examined the evolution of the botnet. In this follow-up we will discuss a new botnet operating model that allows an attacker to get an insider’s view of infected organizations without actually being an insider—all while […]

This post, the first of two parts, was written by Raj Samani, Christiaan Beek, and Shane Shook.  Want to spread malware? One of the most effective ways is to use a botnet, a network of infected systems. The goals of botnets have barely changed since we first encountered them more than a decade ago. We […]

Cyber threats have evolved over time to communicate, cooperate, and in some cases directly collaborate among themselves, giving them a distinct advantage over their security counterparts. Hackers possess a culture that is comparatively open, mutually supportive, and largely opportunistic. This has in part contributed to their ability to outpace their security-minded adversaries. This cooperation is an advantage […]

Cybersecurity changes rapidly. Those with valuable insights can better prepare for the shifting risks and opportunities. Intel Security has just released the McAfee Labs 2016 Threats Predictions, a report covering both cybersecurity predictions for the coming year as well as a five-year look forward at the changing security field. Collectively, the report paints a picture of a growing […]