Published: 12 September 2013
Summary
This document provides information security practitioners with strategic and tactical best practices to mitigate advanced targeted malware by leveraging both existing and emerging security technologies.
Included in Full Research
- Use a Strategic Security Approach to Implement Tactical Best-Practice Controls
- What Best Practices Must Be Adopted to Reduce the Threat of ATAs?
- Keep Up to Date With the Threat Landscape
- Thwart Social Engineering Techniques Through Education
- Best Practices That Apply to All Technical Control Layers
- Upgrade Your Perimeter and Network-Based Security
- IPsec and SSL VPN Remote Access Connections
- Next-Generation Firewalls
- Intrusion Prevention Devices
- Web Application Security
- Advanced Threat Protection Appliances
- Focus Your Infrastructure Protection Strategy Toward Malicious Content
- Email Content Security
- Web Content Security
- Uplift Your Endpoint Security Controls and Detection Stance
- Improve Your Automated Monitoring, Correlation and Analysis
- Improve Your Incident Response Capabilities