Customizing defense models to reduce the window of exposure
by Zeljka Zorz - Managing Editor - Thursday, 17 October 2013.
Most organizations already have a defense model in place that is meant to protect them from attacks, but the problem is that many use an outdated one.

But the threat landscape has changed and is constantly changing. Currently, that involves many client side attacks, and the possibility of being targeted by persistent attackers, either those affiliated with criminal organizations or state-sponsored ones.

The time has come to improve security models, and to adapt them to current and specific threats each organization is facing - i.e. do a little prioritizing.

In this podcast recorded at Virus Bulletin 2013, Andreas Lindh of I Secure talks about the technologies in use that are no longer enough, the effectiveness of patch management and the need for hardening, and the things every organization has to take into consideration when creating its customized defense model.

Press the play button below to listen to the podcast:



Andreas Lindh is a security analyst and architect from Gothenburg, Sweden. He works for I Secure Sweden AB, a company specializing in SIEM, SOC and other areas of security operations.

Andreas is a holder of the CISSP certification, a member of OWASP Sweden, and a web application security enthusiast.

Spotlight

The evolution of backup and disaster recovery

Posted on 25 July 2014.  |  Amanda Strassle, IT Senior Director of Data Center Service Delivery at Seagate Technology, talks about enterprise backup issues, illustrates how the cloud shaping an IT department's approach to backup and disaster recovery, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Jul 28th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //