Statistically effective protection against APT attacks

Jarno Niemela F-Secure

There are a lot of different hardening and best practice guides available which tell how operating system and applications should be hardened against attacks.

However, as anyone who has worked with corporate security knows, implementing hardening at corporate level is a rather expensive operation - and thus there is significant resistance to applying any measures that fall outside of standards and what is already known to work.

This research paper investigates different exploits used during 2012 and early 2013 and identifies which defensive measures would have been effective in blocking them, thus giving guidance as to which defensive measures should be applied first as they provide as wide a coverage as possible.

VB2013 takes place 2-4 October 2013 in Berlin, Germany.

The full programme for VB2013, including abstracts for each paper, can be viewed here.

Click here for more details about the conference or register online.  digg this! digg this

Quick Links

Should software vendors extend support for their products on Windows XP beyond the end-of-life of the operating system?
Yes - it keeps their users secure
No - it encourages users to continue to use a less secure OS
I don't know
Leave a comment
View 23 comments

SMI Oil and Gas Cyber Security 2014

Virus Bulletin
In this month's magazine:
  • VBSpam comparative review March 2014
  • VB100 comparative review on Ubuntu Server 12.04LTS
  • The shape of things to come
  • Threat intelligence sharing: tying one hand behind our backs
  • The curse of Necurs, part 1
  • More fast or more dirty?
  • Tofsee botnet
  • Back to VBA
  • Is the security industry up to the new challenges to come?
  • Greetz from academe: No place to Hyde
Virus Bulletin 04 2014
Subscribe now!

Virus Bulletin currently has 231,303 registered users.