• 00:18

    Methods for Extending Visibility to Servers to Detect APT and Insider Abuse

    in Technology

    Security and Information Event Managers (SIEM) tools rely heavily on perimeter security logs, like those from firewalls, IPS and router NetFlow, The sharing of these logs with SIEMs have been very successful in identifying sophisticated external attacks in very early stages.  Now, for most organizations, the most severe data breaches are coming from privileged insiders or from Advanced Persistent Threats (APT) that imitate the privileged user.  In this podcast Caleb talks with experts from Vormetric to explore if it is possible to use the tried and true SIEM and anomaly detection techniques with file system level log information to detect and identify APT and Insider abuse.

  • 00:36

    Proactive APT and Root Abuse Mitigation Techniques

    in Technology

    With growing numbers of cybercriminals and nation state actors intent upon stealing your electronic assets, disrupting your business operations and pilfering your intellectual property, you now need proactive strategies in place to mitigate risks that go beyond a traditional perimeter firewall. The most dangerous data theft threats are coming from the internal privileged user - not always the actual user, but often an external party that compromised a privileged user with Advance Persistent Threat (APT) tactics. Allowing privileged users, such as database, server, hypervisor, cloud infrastructure and storage admins, access to sensitive data unnecessarily increases the risk surface of your business and greatly simplifies an APT's mission of stealing your most valued data.  In this podcast Caleb Barlow will be joined by Vormetric Executives: CEO Alan Kessler and CSO Sol Cates, and the 2BSecure President and Former Chief Information Security Officer, Central Intelligence Agency (CIA), Bob Bigman.  We will discuss the latest data-theft trends and modern techniques to protect your data as close to the source as possible with data centric security and data firewalls across physical, virtual, private cloud and public cloud environments.  The solution will include exploration of IBM InfoSphere Guardium products, encryption techniques, strong policy controls, and security intelligence.
    Topics or interested parties may also include SafeNet, Trend Micro, Oracle, NTAP, VMware, AWS, Imperva customers using or considering TDE, FDE, volume encryption, privileged users access management (PAM), Database Account Monitoring (DAM), Vulnerability assessment tools, data discovery and data leak prevention (DLP) .  

Loading...
Loading...