Using a layered security approach to achieve network integrity

Friday, 6 February 2004, 8:12 AM EST

It's becoming increasingly clear that the current model for network security -- defend the perimeter and patch, patch, patch -- has some serious shortcomings.

First, relying on signature files and patches doesn't provide the absolute protection that some vendors promise. Even if your perimeter systems are fully up to date, new attacks that signature files don't recognize will still get through. That was the case in January 2003 when the Slammer worm struck, spreading so quickly around the world that it slipped right past signature-based defenses and reached most vulnerable hosts within 18 minutes.

Fast worms such as Slammer and new blended attacks that combine worms and viruses will likely become more common this year. Because only their authors know what forms these attacks will take, IT teams have no way of blocking them with signature files. For all the investment being made in perimeter defenses, enterprise networks remain vulnerable.

By Eric Ogren at Computerworld.

[ Read more ]




Spotlight

Staples customers likely the latest victims of credit card breach

Posted on 21 October 2014.  |  Multiple banks say they have identified a pattern of credit and debit card fraud suggesting that several Staples Inc. office supply locations in the Northeastern United States are currently dealing with a data breach.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //