Kevin Mitnick Authors Appsense Whitepaper
Wednesday, 12 July 2006 by Michel Roth
AppSense, a leader in endpoint security solutions for the enterprise, today announced the availability of a new white paper to help corporate customers minimize the risks associated with sophisticated computer security threats. The AppSense-sponsored white paper is authored by Kevin Mitnick, a renowned IT security consultant and founder of Mitnick Security Consulting LLC, a Las Vegas-based consulting firm.

Titled, "Mitigating Malware in Userland," the white paper illustrates detailed insights into a typical computer hacker's mindset and provides real-life examples of IT security breaches at various corporations. The paper includes a thorough analysis of various protection technologies and concludes with a "Best Practices" recommendation on how to secure an enterprise from today's elaborate attackers.

"Today's hackers are incredibly savvy in their methods, exploiting IT systems to steal sensitive information for financial gain," said Mitnick. "These malicious hackers utilize everything from Rootkits, Trojans and Backdoors to infiltrate the corporate network and obtain highly sensitive intelligence. This white paper evaluates technologies such as trusted ownership, white/black lists and digital signatures, and details what IT administrators should do to control user behavior, eliminate hacker attacks and protect systems and vital information."

The white paper covers:
• Impact/threat of hacking attacks, worms, viruses, Trojans, and the newest form of attack 'botnets,' and how hackers have become incredibly creative in how they put malicious code on targeted systems.

• Attacker motivations. Rather than being motivated by status, ego and revenge, malware authors are increasingly driven by the financial gains possible through exploiting information obtained via malicious code, such as botnets and Trojan Horses.

• Analysis of existing technologies on the market for mitigating risk, including restricting user privileges, self-healing, anti-spyware utilities, trusted ownership, digital signatures and white/black lists.

• Recommendations of what organizations of all sizes must do to successfully and continually protect their systems against attacks.

Read the whitepaper here.

Related Items:

Win32/Blaster: A Case Study From Microsoft's Perspective (5 December 2005)
Doug Brown / Premitech Citrix Performance Monitoring Whitepaper (17 February 2005)
Softricity White Paper Published (30 January 2007)
Network Performance In VMware Whitepaper (24 March 2005)
Microsoft Windows Server 2003 TCP/IP Implementation Details (6 April 2005)
Performance Benchmarking Guidelines for VMware Workstation 5.5 (1 May 2006)
MS Download: Windows 2003 Terminal Server Capacity and Scaling Whitepaper (16 March 2005)
VMware VDI Server Sizing and Scaling Whitepaper (26 August 2006)
VMware Infrastructure 3 Technical Papers (6 June 2006)
Rootkits Operating From BIOS (27 January 2006)
Comments (0)