Gartner Blog Network

Tag: 'apts' Blog Posts

from the Gartner Blog Network

Virtualization, Containers and Other Sandboxing Techniques Should be on Your Radar Screen

by Neil Macdonald  |  March 16, 2013

  The idea of “sandboxing” potentially malicious content and applications isn’t new but interest in this type of approach on Windows desktops is growing. Further, the increasing variety of virtualization...

Read more »

This Just In: Signature-based Protection Ineffective Against Targeted Attacks

by Neil Macdonald  |  January 31, 2013

  Seriously, is anyone surprised? I’m sure you’ve seen the news about Chinese infiltration at the New York Times: http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html According to the article: Over the course of three months,...

Read more »

Playing chess with APTs

by Dan Blum  |  December 28, 2012

During a briefing from the top security analyst at one of the Washington-area cyber centers, I got the idea that resisting targeted attacks from sophisticated adversaries (so-called advanced persistent threats,...

Read more »

Sand Castles and Advanced Persistent Threats

by Neil Macdonald  |  July 11, 2011

I’ve been absent from blogging for 2 weeks – first we had the Gartner Information Security Summit in DC and then I took some time off for a much-needed vacation....

Read more »

Don’t Trust Your Servers

by Neil Macdonald  |  June 17, 2011

One of the toughest problems in information security is addressing advanced intrusions that have bypassed traditional security controls and now reside undetected on enterprise systems. With financially motivated attacks and...

Read more »

Improving Security by Killing Server and Desktop Workloads

by Neil Macdonald  |  June 16, 2011

It sounds counterintuitive, but today’s advanced threat environment requires new approaches to the ongoing security and management of server and desktop workloads. The trouble with Advanced Persistent Threats is that,...

Read more »