The Latest in IT Security

Posts Tagged ‘methodologies’

The following is excerpted from a talk I gave at the 2012 APCERT meeting in Bali, Indonesia in March, 2012. The topic was on botnet population measurements, something that we’ve been doing for many years and has grown in importance. What do we mean when we talk about measuring botnet populations? We are trying to […]

Read more ...

18
Jan
2012

Just as the saying goes that there are many ways to skin a cat, threat investigation can also be done a handful of different ways, employing various expertise, especially when dealing with a threat employing several pieces of malware and a relatively robust C&C infrastructure.But even though methodologies may change, whether through reverse engineering or […]

Read more ...

Alexey Polyakov is a Head of the Global Emergency Response Team of Kaspersky Lab – a new security policy consultation service for current and new corporate customers. Over the last 12 months this new service has responded to numerous incidents in which corporate customers’ networks have been targeted. As a result, Kaspersky Lab’s experts have […]

Read more ...


Categories

FRIDAY, APRIL 26, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments