Business Management

EMA Report: Find Targeted Attacks Early

Provided by LightCyber

Category Business Management

Type Analyst Report

Publish Date September 21 2015


Breaches are at epidemic levels in 2015. Extended dwell times of six months post-breach are commonplace, and this year has seen hundreds of millions of records exfiltrated. Prevention technology, though part of an effective defense strategy, needs help. This paper discusses the issues with prevention, dwell time post prevention-failure, and how these are changed by LightCyber and the Magna platform.
Taking a page from epidemiology, the breach is just the introduction of a pathogen into an environment. Ultimately, the pain of this injection is nothing compared to the actual damage as the pathogen spreads in the host. In the case of a cyber-breach, this pathogen is the threat actor and the host is the compromised organization. Sickness and weakness occur when data is exfiltrated or destroyed, or the business is taken offline. Just as with the spread of disease, early detection is key for to maintain health. LightCyber Magna provides active breach detection which increases early detection capabilities, thus reducing dwell time of the threat. Magna then provides the ability to perform incident response and threat quarantine and removal before others in the environment are compromised. This significantly reduces and even prevents data exfiltration, thus maintaining the strength of the organization.
The Report Includes the Following Sections:
•    Creating a Common Nomenclature – Definition of a Breach
•    Prevention is not Perfect, but It’s Vital
•    Early Detection is Key to Preventing Data Leakage
•    Enter Light Cyber Magna Active Breach Detection
•    Providing Better Analysis
•    Automating Research and Investigation
•    EMA Perspective

Recommended for You


Latin America’s push towards digital transformation

Keri Allan looks at the latest trends and technologies


Meeting Owl brings new wisdom to conferencing

Martin Veitch's inside track on today’s tech trends


A rare glimpse inside the Chinese cybercrime underground

Phil Muncaster reports on China and beyond

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.


Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.



Should the government regulate Artificial Intelligence?