Tag Archives: APT

Cyber-Espionage: Every Business is a Target

For those of us in the world of information security, the news of Attorney General Eric Holder bringing a first-of-its-kind criminal cyber-espionage case against Chinese military officials is no surprise at all. For years, the Chinese have been known for launching cyber-attacks on American industrial and military targets to steal prized military secrets and other […]

Why should every organization embrace secure development?

Author: Todd Becker, PCI QSA, ISO 27001 Auditor Secure development is not just for software companies and custom application development shops. Embracing secure development practices in IT and procurement functions within an organization ensures that reasonable and appropriate actions are exercised to achieve compliance to regulations and other security requirements. According to a 2013 Ponemon report, […]

NEXT-GEN MALWARE DEFENSE

‘Malware’ has come a long way. From merely annoyance applications coded by bored engineering students for notoriety all the way to professionally developed stealth applications for financial gains and stealing state secrets. According to Verizon’s 2012 Data Breach Investigations Report, 69% of the breaches were attributed to malware infections. The business impact of such Advanced Malware […]

HALOCK INVESTIGATES: Network Chatter from China

  Imagine one hundred container ships full of the most valuable U.S. assets heading to China every day. Diamonds, gold, oil, John Deere Tractors, priceless artwork, Chevy Corvettes, life-saving artificial hearts, books from our historic libraries, soybeans, the latest Intel® processors, Redwood trees, the genuine Constitution of the United States of America, the Statue of […]