Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SUNNYVALE, CA -- (Marketwired) -- 09/19/13 -- Proofpoint, Inc., (NASDAQ: PFPT), a leading security-as-a-service provider, released new research today that shows the volume of cyber-attacks are clearly different by industry and spread across a much wider range of industries than anticipated. Research indicated broad "longlining" attacks on pharmaceutical, retail, education, and more than 15 other sectors, as well as more focused attacks on the technology and financial service sectors.
"The assumption that certain industries are more targeted by attackers than others appears legitimate, though some of the higher-scoring industries surprised us, as some don't typically consider themselves targeted," said David Knight, executive vice president, information security products at Proofpoint. "The research shows that advanced malware-based attacks are targeting a broader range of industries than we expected."
The research is available free of charge on Proofpoint's recently launched "Threat Insight" (www.proofpoint.com/threatinsight) resource site that also features additional research on the effects of user training on reducing clicks on malicious URLs, videos of drive-by downloads in action, and an analysis of attacker infrastructures, along with research papers and introductory materials and a glossary for IT staff seeking additional industry knowledge.
In addition to real-time content, the site also features videos, podcasts and security-oriented news feeds that serve as a convenient conduit for staying current on emerging threats as they are uncovered. A threat glossary and Proofpoint's monthly threat reports are also shared on the site to provide additional resources for those in the industry looking for trend analysis combatting Advanced Persistent Threats (APT).
APT-related attacks and targeted threats have consistently been in the news this year with breaches at organizations such as Twitter, New York Times, Wall Street Journal, South Carolina Department of Revenue, Associated Press, Viber and other companies. In 2012, according to Verizon, such attacks were responsible for nearly half of the exposed data with 95 percent of targeted attacks and Advanced Persistent Threats initiated via email-based spear phishing. In addition, techniques such as 'longlining' attacks have resulted in a far greater number of threat campaigns attacking companies in a highly targeted manner. Proofpoint's unique cloud-based platform and Big Data analytics provide unprecedented visibility into these advanced threats, and Proofpoint's new research showed that:
"Threat Insight" is live at www.proofpoint.com/threatinsight and can be followed on twitter @threatinsight.
About Proofpoint, Inc.
Proofpoint Inc. (NASDAQ: PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint's expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information. More information is available at www.proofpoint.com.
Proofpoint is a trademark of Proofpoint, Inc. in the U.S. and other countries. All other trademarks contained herein are the property of their respective owners.
Add to Digg Bookmark with del.icio.us Add to Newsvine
Media Contact:
Orlando Debruce
Proofpoint, Inc.
408-338-6829
Email Contact
Sarmishta Ramesh
Ogilvy Public Relations
303-527-4615
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs