Finding Advanced Threats Before They Strike: A Review of Damballa Failsafe Advanced Threat Protection and Containment

by Jerry Shenk
Sept. 1, 2017 0 comments SANS Institute incident handling

The year 2013 witnessed a seemingly unending parade of headline-grabbing, highprofile data breaches, many of which started out as the result of compromised endpoints. For example, Target’s high-profile breach announced in December 2013 was reportedly the result of compromised point-of-sale (POS) systems.1 The successful attacks in early 2013 against Apple, Facebook and Twitter featured well-executed attacks on endpoints stemming from a “watering hole” tactic that made use of a compromised website frequented by developers of apps for Apple’s iOS devices.2