The most challenging thing about evaluating anti-malware solutions is the variety of architectures that can be employed to address the problem. Let’s look at three product categories and see how they might provide value to an organization: 1. Application Control…
Threat Management
Threat Management
Do Enterprises Need AMP? An “Advanced Malware Protection” Market Assessment
by Pete Lindstrom • • Comments Off
Over the past few months I have been on an “advanced malware protection” (AMP) kick. I am fascinated by this topic because it ties together a set of market conditions that can be extremely challenging to navigate through, both for…
Just a Reminder for RSA: The “P” in APT stands for “Persistent”
by Pete Lindstrom • • Comments Off
RSA’s Chairman Art Coviello has issued an open letter to its customers about a security breach that resulted in lost information related to SecurID. Two lines don’t seem to go together: “Recently, our security systems identified an extremely sophisticated cyber…
Addressing the Advanced Persistent Threat (APT)
by Pete Lindstrom • • Comments Off
In the past few weeks, the Advanced Persistent Threat (APT) has been all the rage in the infosec world. Security professionals everywhere are taking sides about whether APT is new or not, despite (or perhaps due to) the lack of…
Top Ten Web Security Risks
by Pete Lindstrom • • Comments Off
Here is a list of the top ten Web security risks: Hidden Manipulation Cookie Poisoning Backdoor and Debug Options Buffer Overflow Stealth Commanding 3rd Party Misconfiguration Known Vulnerabilities Parameter Tampering Cross Site Scripting Forceful Browsing Looks like a pretty timely…