article thumbnail

MITRE evaluates Enterprise security products using the ATT&CK Framework

Security Affairs

In the first phase, MITRE offered the possibility to evaluate the service and its efficiency on a case study on APT3/Gothic Panda cyber espionage group. As of June 2015, the group appears to have shifted from targeting primarily US victims to primarily political organizations in Hong Kong. . Pierluigi Paganini.

article thumbnail

Analyzing AZORult malware using NSA Ghidra suite

Security Affairs

Cybaze-Yoroi ZLAB malware researchers decided to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware. One of the most expected moments in the infosec community during the last few months was, with no doubt, the Ghidra public release. Figure 2: Communication of the malware with the C2.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 ways ISO 27001 can enhance your business

IT Governance

The negative effects of security incidents can be seen to some extent in almost all breaches, but for an extreme example, see the aftermath of the 2015 TalkTalk breach. You’ll learn how to implement ISO 27001 in nine steps and have the opportunity to get involved in group discussions, practical exercises and case studies.

article thumbnail

Feature Spotlight: Notes

Archive-It

by Tanya Ulmer, Web Archivist for Archive-It Notes are a convenient way to communicate with others working in the same Archive-It account, or even with yourself at a later date. They’re often overlooked in favor of external spreadsheets, docs, or other tracking software for such communications.

article thumbnail

Feature Spotlight: Notes

Archive-It

by Tanya Ulmer, Web Archivist for Archive-It Notes are a convenient way to communicate with others working in the same Archive-It account, or even with yourself at a later date. They’re often overlooked in favor of external spreadsheets, docs, or other tracking software for such communications.

article thumbnail

Best value procurement recognizes vendors as experts

CGI

Wed, 08/26/2015 - 03:15. As the failure of large information and communications technology (ICT) projects has become a matter of public discussion in several countries, the Best Value Procurement (BVP) approach is gaining rapid ground. Best value procurement recognizes vendors as experts. narmada.devarajan.

article thumbnail

APEC Privacy Update – Beijing Meetings

Hunton Privacy

Particular focus will be on communicating the benefits of participating in the CBPR system both to APEC economies and businesses. The next round of meetings will be held in the Philippines at the end of January 2015. Canada, Mexico, New Zealand, Australia, Japan, Singapore and South Korea. Next Meeting.

Privacy 40