Latest from Intel Security

Beyond Blueprints – A Guide to Data Driven Construction

Harness the Power of Data to Transform Traditional Practices Most AEC professionals rely on years of experience and instinct. The advent of a centralized, cloud platform has led to a paradigm shift, with data now driving decisions. Egnyte’s Beyond Blueprints Ebook outlines how to embrace the change and harness the power of data for:• Secure […]

Read →

Keep Your Data Safe for Office 365

Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious insiders. McAfee Data Loss Prevention offers comprehensive protection for your […]

Read →

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection

This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and […]

Read →

Busted: Seven Myths of Advanced Malware

Advanced malware is the catchall term for the most sophisticated, evasive, destructive, and ever-evolving cyber threats. Fed by lack of understanding and anxiety?and sometimes perpetuated by security vendors?a number of misconceptions have arisen concerning this cyber menace. This guide will examine seven common misconceptions and distinguish between myth and reality.  

Read →

Safeguarding Against Pinkslipbot

W32/Pinkslipbot is a self-propagating malware family created to steal personal and financial data from its victims. This malware allows complete control of infected systems through a command-based backdoor operated by the control server as well as a virtual network computing-based backdoor. Pinkslipbot can also spread to other systems within the environment through network shares and […]

Read →
25,000+
Articles
500K+
Monthly Readers
300+
Sponsors
15+
Years of Insights