Using a layered security approach to achieve network integrity

Friday, 6 February 2004, 8:12 AM EST

It's becoming increasingly clear that the current model for network security -- defend the perimeter and patch, patch, patch -- has some serious shortcomings.

First, relying on signature files and patches doesn't provide the absolute protection that some vendors promise. Even if your perimeter systems are fully up to date, new attacks that signature files don't recognize will still get through. That was the case in January 2003 when the Slammer worm struck, spreading so quickly around the world that it slipped right past signature-based defenses and reached most vulnerable hosts within 18 minutes.

Fast worms such as Slammer and new blended attacks that combine worms and viruses will likely become more common this year. Because only their authors know what forms these attacks will take, IT teams have no way of blocking them with signature files. For all the investment being made in perimeter defenses, enterprise networks remain vulnerable.

By Eric Ogren at Computerworld.

[ Read more ]




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //