This blog was originally posted at Dark Reading on March 31. Shared cyberthreat intelligence will soon be a critical component of security operations, enabling organizations to better protect their
Category: Advanced Persistent Threats
Successful targeted attacks bypass security controls and typically cause significant damage to an enterprise. Damages may include reputation, monetary, and intellectual property losses. Many attack
Malware is working hard to undermine and punish those who employ security sandboxes. Meanwhile, security innovators are working hard to stay one step ahead. Security sandboxes are a crucial tool in
This post was written by Haifei Li of Intel Security and Xiaoning Li of Intel Labs. Microsoft Office documents play an important role in our work and personal lives. In the last couple years, unfor