Tag: Trusteer

Black Hat USA 2014

Please join IBM Security at Booth 235 during Black Hat USA 2014,  the show that sets the benchmark for all other security conferences.   We will showcase the broad portfolio of IBM Security technology differentiators – specifically...

Cybercrime Threat Landscape: Cybercriminals Never Sleep

A Glimpse into the Cybercrime Underground In this session, IBM Security’s Etay Maor will dive into the latest tools, techniques and threats developed and utilized by cybercriminals. The presentation will include a market overview of the latest...

Meet the Zberp Trojan

Recently Trusteer researchers discovered a new Trojan that has been targeting more than 450 financial institutions around the world, mainly in the US, UK and Australia. The new Trojan which seems to be a variant of the well-known Zeus Trojan (aka...

Future of Endpoint Protection: 3 Must-Have Requirements

Today's rapidly evolving threat landscape requires advanced, intelligent endpoint protection to prevent APTs and zero-day attacks. Here are three must-have requirements that every organization needs in their endpoint security solution to protect...

Detection Is NOT the New Prevention

What does it take to stop today's extremely motivated and well-trained cyber attackers? Is prevention pretty much dead? Is rapid detection the new prevention? There has been a dangerous shift recently in the prevailing wisdom of the security...