Customizing defense models to reduce the window of exposure
by Zeljka Zorz - Managing Editor - Thursday, 17 October 2013.
Most organizations already have a defense model in place that is meant to protect them from attacks, but the problem is that many use an outdated one.

But the threat landscape has changed and is constantly changing. Currently, that involves many client side attacks, and the possibility of being targeted by persistent attackers, either those affiliated with criminal organizations or state-sponsored ones.

The time has come to improve security models, and to adapt them to current and specific threats each organization is facing - i.e. do a little prioritizing.

In this podcast recorded at Virus Bulletin 2013, Andreas Lindh of I Secure talks about the technologies in use that are no longer enough, the effectiveness of patch management and the need for hardening, and the things every organization has to take into consideration when creating its customized defense model.

Press the play button below to listen to the podcast:



Andreas Lindh is a security analyst and architect from Gothenburg, Sweden. He works for I Secure Sweden AB, a company specializing in SIEM, SOC and other areas of security operations.

Andreas is a holder of the CISSP certification, a member of OWASP Sweden, and a web application security enthusiast.

Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //