home_banner `

Content Icon

Strategies for Thwarting State-Sponsored Hacks

February 23, 2017 | Faculty Reports | Malware and Advanced Threats | By Kevin Beaver, IANS Faculty

State-sponsored attackers are, by definition, highly skilled and highly funded. How can we keep up? In this report, IANS Faculty Kevin Beaver details the challenges around state-sponsored hacking, including the threats, vulnerabilities and risks that must be addressed, starting today, if organizations are going to stay off their radar. 

IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

IANS Vulnerability and Breach Update: Q1 2019

Vulnerabilities and breaches are mainstream news regularly. With a new vulnerability seemingly discovered daily, which should be taken more seriously (i.e., patch now!) and which are overhyped? In this quarterly research report, IANS Faculty Mike Saurbaugh updates clients on the top vulnerabilities and breaches from the past quarter and provides some real-world context and perspective.

Cryptocurrency Exchange Theft Reached $950 Million in 2018

Theft of cryptocurrency from exchanges and infrastructure climbed to $950 million in 2018 at an 84% compound annual growth rate (CAGR) from 2016. More than three-and-a-half times more cryptocurrency was stolen from exchanges in 2018 than in 2017.

Integrate a Vulnerability Scanner with a CMDB

Integrating a vulnerability scanner with a configuration management database (CMDB) can help streamline operations, but what does and doesn't work for such integrations? In this Ask-an-Expert written response, IANS Faculty Marcus Ranum explains the process and offers tips for success.

On-Prem DDoS Mitigation: A Market Overview

What are the best solutions for on-premises DDoS mitigation? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains the pros/cons of the Top 3 vendors – Radware, Arbor and F5 – and details the latest trends in the space.