Through our analysis, it remains clear that Nigerian cyber actors will continue to expand their attacks in terms of size, scope and capabilities. According to law enforcement organizations, the exposed losses to businesses worldwide from these threat actors are now estimated to be more than US$3 billion. Given the substantial risk these actors pose, we present techniques to enable large-scale attribution efforts to combat this threat. In doing so, we demonstrate a repeatable and sustainable process to identify SilverTerrier infrastructure and put preventive measures in place prior to the first samples of malware reaching our security products.


 

Next-Generation Security Platform

To enable organisations to securely roll out new services and apps, Palo Alto Networks built the Next-Generation Security Platform to provide prevention through automation, applied consistently across the network, endpoint and cloud.
  • 2
  • 1061

KPIT Embraces Digital Transformation With a Different Approach to Cybersecurity

When KPIT introduced the concept of the “Smart Enterprise” – a digital transformation initiative consisting of Smart Campus, Smart Collaboration, Smart Business Systems, Smart Insights, Smart Infrastructure, Smart Workforce and Smart Relationships – it realized it needed a more flexible and secure approach to security and network management. Traditional network mapping no longer worked; policy management was inefficient; and administration had become a major drain on resources.
  • 2
  • 238

JBG Smith

Real estate investment firm achieves complete integrated security and consistent policy enforcement across it's enterprise network
  • 0
  • 532

Ada County

Idaho’s Largest County Takes a Next-Generation Approach to Governing Security
  • 0
  • 545

Unior Kovaška Industrija

Real estate investment firm achieves complete integrated security and consistent policy enforcement across it's enterprise network
  • 0
  • 116

Best Practices for Executing on Zero Trust

Read how to apply the Zero Trust cybersecurity strategy through transformation to a prevention-based architecture. Included are technical capabilities as well as business outcomes for each level of transformation as well as tools to measure your capabilities as you progress through the transformation journey.
  • 0
  • 0