April 23rd, 2012
Targeted malware attacks and Advanced Persistent Threats (APTs) are making malware detection and removal much more challenging. It is common knowledge that good security requires a defense-in-depth strategy, as no single solution can provide adequate protection from malware. Traditional approaches to malware detection should still be kept in place, to ensure that known threats and applications that exhibit malicious characteristics are quarantined at the earliest possible stage, but these need to be complimented by more advanced methods and best practices to deal with the ever changing threat landscape.
- March 24th, 2017
One thing that troubles me when speaking to clients, from SMBs to truly global enterprises, is a number of times I see technology driving security strategies and not the business requirements. So many organizations work in silos and not co-ordinating their IT security strategy. It is important to understand WHY you are embarking on a particular security project and how this fits with the wider strategic goals of your company. This, of course, takes longer to start with but significantly shortens deployment life cycles and wasted effort.
- March 9th, 2017
With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.
- March 8th, 2017
For nearly a decade, Avecto’s customers have relied on Defendpoint to underpin “traditional AV”, next generation AV, machine learning and advanced network-based analysis solutions. Despite notable advances, detection will never reach 100% efficacy.
- January 27th, 2017
A new year brings with it a new set of security challenges. From the escalation of ransomware and social engineering to the Internet of Things and the continued security headache that presents. Keeping pace with these challenges and staying one step ahead of cyber crime will be critical for security vendors but it also has a significant knock-on effect for the channel.
- January 16th, 2017
It’s often said that you can either have security or you can have usability, but you can’t have both. Before I worked for a security company I believed this accepted wisdom without question – security was going to be something frustrating and annoying that would get added to my design at some point.