Traditionally, cybercriminals' tools evolve

Discuss hot database and enhance operational efficiency together.
Post Reply
relemedf5w023
Posts: 816
Joined: Sun Dec 22, 2024 7:16 am

Traditionally, cybercriminals' tools evolve

Post by relemedf5w023 »

Alexey Dankov recommends using both proven and innovative means to protect against cybercrime; he lists the following: network segmentation and creation of security contours; security analysis and identification of vulnerabilities in the ICT infrastructure; well-known DLP systems with the addition of modern functionality for analyzing the behavior of users and other objects of corporate ICT infrastructures (UBA, UEBA); user identity management systems (IDM); database protection tools; tools for automating routine information security processes, which free up specialist resources for research, forecasting, and development of the corporate information security system.

faster than information security tools, which dictates the need to use technologies for protection against zero-day threats and targeted attacks, allowing for a preventive response to new attack vectors. Among the trends observed today that help to bridge the gap between the capabilities for carrying out cyberattacks and protection, Vyacheslav Logushev notes the use of analytical tools for solving information security problems using artificial intelligence and machine learning technologies, and various types of deep analytics.

SealProtecting Critical Information: Approaches and Tools
Valery Vasiliev | 04/27/2020
IncreaseAlexey Dankov, Head of Information belize mobile database Department, Cross Technologies
Alexey Dankov, Head of Information Security Department, Cross Technologies
IncreaseVyacheslav Logushev, Director of IT Services and Outsourcing at X-Com
Vyacheslav Logushev, Director of IT Services and Outsourcing at X-Com
IncreaseSergey Samoilov, Head of Network Security and Audit Department, Axoft
Sergey Samoilov, Head of Network Security and Audit Department, Axoft
IncreaseDenis Sukhovey, Director of the Technology Development Department, Aladdin R.D.
Denis Sukhovey, Director of the Technology Development Department, Aladdin R.D.
IncreaseKirill Shchukin, Deputy Director of Oracle Practice at Technoserv Consulting
Kirill Shchukin, Deputy Director of Oracle Practice at Technoserv Consulting
This itWeek review is devoted to the current challenges of protecting critically important information (CII), the confidentiality of which is most important for its owners.

Corporate data protection cannot be effective if its costs exceed the value of the data itself. Therefore, before starting to build a corporate information security system, it is necessary to identify the most valuable, critical information for owners and assess what damage may be caused by its theft, destruction, distortion or inaccessibility to users.
Post Reply