4 Articles Tagged stealth

Avaya Article Thumbnail

APTs Part 4: How Do You Detect an Advanced Persistent Threat in Your Network?

  • Ed Koehler
  • February 15, 2017 | Estimated reading time: 4 minutes to read
  • Here in part four of my APT series, we’re looking at how to detect Advanced Persistent Threats in your network. The key is to know…
Avaya Article Thumbnail

APTs Part 3: Prevention is Ideal, But Detection is a Must

  • Ed Koehler
  • February 8, 2017 | Estimated reading time: 4 minutes to read
  • In my last blog I spoke about the first steps in the kill chain. Now that the Advanced Persistent Threat (APT) has gained residence, it’s…
Avaya Article Thumbnail

APTs Part 1: Protection Against Advanced Persistent Threats to Your Data

  • Ed Koehler
  • January 10, 2017 | Estimated reading time: 4 minutes to read
  • Hardly a day goes by without hearing about a data breach somewhere in the world. So it’s timely that we launch this new blog series…
Avaya Article Thumbnail

How to Fail a Hacking Challenge

  • Maan Al-Shakarchi
  • July 20, 2016 | Estimated reading time: 2 minutes to read
  • 32 million Twitter passwords stolen, 117 million LinkedIn accounts compromised, and even Marc Zuckerberg’s Pinterest account hacked—there seems to be no let-up in IT security…