blended threat


Also found in: Dictionary, Thesaurus, Medical, Legal, Wikipedia.

blended threat

Using several techniques to attack a computer system or network. After all, why adopt just one method when viruses, worms, Trojans and software vulnerabilities used in clever combinations can help to ensure that more systems are compromised and more people are harmed? See virus, worm, Trojan and vulnerability.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
The survey, conducted in late August of 200 IT security officials from Germany, France, Sweden, Netherlands and the United Kingdom, said 28 per cent of the respondents do not have any fortifications in place to prevent blended threats.
Unlike some viruses and worms, a blended threat's g0al is to cause harm rather than being destructive or simply a nuisance.
SurfControl plc is a world leading Internet Security company delivering multiple layers of threat protection to shield organizations against complex blended threats. SurfControl's Enterprise Protection Suite has redefined traditional "filtering" by offering a unified threat management solution that eliminates spam, spyware and phishing attacks, as well as Web and e-mail abuse.
The white paper also predicts that a growing number of firms will prefer comprehensive secure content management tools that include anti-virus, firewall, Web filtering and related capabilities to help correlate and analyze emerging blended threat attacks.
AlertEnterprise software provides prevention of insider threats, fraud, theft, sabotage and acts of terrorism by overcoming vulnerabilities and blended threats across information technology, operational technology (OT), physical access systems and industrial control systems.
AlertEnterprise software provides true prevention of insider threats, fraud, theft, sabotage and acts of terrorism by overcoming vulnerabilities and blended threats across Information Technology, Operational Technology (OT), Physical Access Systems and Industrial Control Systems.
The result is protection from rapidly spreading malware campaigns, targeted phishing attempts, blended threats including drive-by downloads, and a 99.9 percent rate of blocked spam with nearly zero false positives.
The unified application of AI on all data defends against blended threats and other modern menaces, protection that older silo-oriented approaches cannot offer.
Increasingly, blended threats that combine several methods -- for example, phishing, malware and hacking -- are being used tointroduce malware, embed the malware in networks, remain undetected for long periods of time and steal data or disrupt critical systems.
Increasingly, blended threats that combine several methods --for example, phishing, malware and hacking-- are being used to introduce malware, embed the malware in networks, remain undetected for long periods of time and steal data or disrupt critical systems.
Advanced threats are increasingly sophisticated, and employees at all levels, in all industry sectors, are subject to targeted attacks ranging from spear-phishing to blended threats. How prepared is your organization to detect these advanced threats and respond effectively to targeted attacks - before irreparable damage is done?
Sameer J Ratolikar, CTO, Bank Of India, feels that detection of blended threats is very important.