Live from InfoSecurity Europe 2014: The Nitty Gritty of Sandbox Evasion

Status
Not open for further replies.

Terry Ganzi

Level 26
Thread author
Verified
Top Poster
Well-known
Feb 7, 2014
1,540
Infosecurity Europe 2014 was a great gathering of the top minds in cybersecurity, and in case you missed the event, we were excited to capture live content from the show floor to share with our readers. Over the next few days, the FireEye Blog will be sharing a number of insightful podcasts with various experts in the field on the hottest issues in information security.

Paul Dwyer, director at FireEye, had an opportunity to sit down with FireEye Senior Director of Market Research, Rob Rachwald to discuss the ins and outs of sandbox evasion including the four categories of evasion.

Rachwald says it is critical to understand sandbox evasion methods, “we need to understand what these evasion methods are in great detail. And if you do know it in great detail, you can do two things. One, you can build a better defense, and two, you can look for technologies that are really, really strong to help improve your defenses. “

To learn more about sandboxing, click here for the white paper Hot Knives Through Butter. To listen to the full podcast live from Infosecurity Europe 2014, click here, and make sure to check back soon for our next featured interview.

This entry was posted in Advanced Threat Trends, Business of Security, Security Perspective and taggedCybersecurity, evasion techniques, FireEye, InfoSec 2014, Infosecurity, Rob Rachwald, Sandbox by Helena Brito. Bookmark the permalink.
 
  • Like
Reactions: Venustus
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top