Tuesday, January 10, 2017

When to take a bug bounty program public -- and how to do it

TechTarget
Latest Technology News and Expert Advice
A roundup of news and tips on the topics you're interested in | January 10, 2017
TechTarget
ISSUE HIGHLIGHTS
When to take a bug bounty program public -- and how to do it
How does the OneSoftPerDay adware hide from antimalware systems?
Are Conficker malware infections of ICS or SCADA systems a threat?
How to prevent ransomware or recover from a ransomware breach
Threat monitoring: Why watching the dark web is crucial
EXPERT ADVICE
When to take a bug bounty program public -- and how to do it
Bug-finding programs are valuable to enterprises, but they require a lot of planning and effort to be effective. Sean Martin looks at what goes into taking a bug bounty program public.  
How does the OneSoftPerDay adware hide from antimalware systems?
OneSoftPerDay, an adware program can install backdoors on PCs, is able to avoid detection from antimalware tools. Expert Nick Lewis explains how to mitigate its effects.  
Are Conficker malware infections of ICS or SCADA systems a threat?
Conficker malware was found in a German nuclear power plant computer system. Expert Nick Lewis explains the possible impact of malware infections of ICS and SCADA systems.  
How to prevent ransomware or recover from a ransomware breach
Ransomware, the latest malware threat with which information security professionals must grapple, is spreading, according to many authorities. This TechGuide explores the nature of the threat and the latest ransomware trends. But it does more than merely raise the alarm: Included in this primer on ransomware is also actionable intelligence on both ransomware prevention and recovery. It outlines several steps information security pros should take now in order to heighten their company's resistance and prevent ransomware attacks. It also guides information security pros through recovery steps if they are indeed victims of a ransomware attack.

Readers of this guide will gain a deeper insight into the nature of ransomware and how it's changing and spreading. But they will also be better equipped to prevent ransomware attacks and possess crucial knowledge to guide them in the event of a ransomware attack on their corporate systems.

  
Threat monitoring: Why watching the dark web is crucial
Enterprises should broaden their threat monitoring to include dark web sites. Expert Matt Pascucci explains why it's important, and what enterprises can learn from the dark web.  
About This E-Newsletter
This email is published by the TechTarget Security Media Group. Copyright 2017 TechTarget, Inc. All rights reserved. Designated trademarks and brands are the property of their respective owners.
TechTarget
To unsubscribe from all Security Media Group emails,
Go to unsubscribe.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466
Contact: webmaster@techtarget.com

When you access content from this email, your information may be shared with the sponsors of that content as described in our Privacy Policy.

About TechTarget:
TechTarget publishes media for IT pros with more than 100 focused websites providing quick access to a deep store of news, advice and analysis about the technologies, products and processes crucial to your job.

No comments: