Choose from several options for complete web, email and data security.
Evaluate Websense products by watching demos and installing evaluation software.
Learn how Websense solutions help keep our customer safe, secure and productive
Get information on product updates, support resources and more.
Get the most out of support in five simple steps.
Find tools and assets to help sell Websense solutions.
Come work for the global leader in unified information security.
we want to hear from you >
If you are like me, you’ve seen and heard plenty about Advanced Persistent Threats (APTs) this year. It’s the new hot-button term. So popular that everyone has their own definition.
FUD continues to cloud the discussion we should be having. So we are starting a series of posts to separate the fact from fiction and to really nail what you should be concerned about. We will:
Websense Security Labs has been on the forefront of examining APTs in the wild and have charted the emergence of these exploits. We’ll explain why high-profile attacks seem to work so effortlessly. And we’ll discuss the ongoing evolution of APTs: from government/nationalistic targets to organized criminal gangs and soon individual hackers.
I encourage you to join our June 8 webcast on APTs. It’s being hosted by Patrik Runald, one of our senior security research managers.
Let’s skip the APT hype and FUD. Let’s use real-world examples to talk about what matters most to you.
In the meantime, I have my own question: how many of you have been approached by senior management with any questions about big data breaches, like, “Hey, I saw the news about (insert company) losing company data. What are we doing to avoid that?” What did you say?
Well guys this is your opportunity to shine and I hope you don't spew marketing hyperbole else this will turn dull rapidly. Yes I have had the question posed to me at least twice in the past 6 months...How did I respond...the best we can with the tools we have or something like that!
Whatever you do please don't make the claim your stopping APT threat or I will drop a dime on you.
Bad business policy is culprit number one here.
Browsers executing active code is problem number two.
Lack of trust models as it relates to executables is problem number three.
Failure to inspect all PE32's is problem number four.
Five and beyond - smart guy's know more, figure it out on your own.
Why we ever allowed active code that has no trust related to it is just poor computer design, face facts. We made bad design decisions because we didn't consider the problems at the time.
Oh yeah, I forgot the biggest culprit. Porn looks better with active code and sex drives the net.