ICT Security-Sécurité PC et Internet
87.1K views | +1 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

InformationWeek Mobile Edition

In-depth malware analysis can be part of a comprehensive vulnerability management strategy. Here's how to get started.

 

By Neil Roiter, Dark Reading
September 30, 2011 02:47 PM


Vulnerability management translates into reduced risk, not invulnerability. Your antivirus and intrusion detection/prevention systems can't detect and stop every piece of malware. Even as our security programs mature and our security tools become more sophisticated, attackers have gotten too good at getting into our networks.


A layered defense-in-depth requires enterprises to augment their vulnerability management, malware prevention, and intrusion detection programs with malware analysis. The goal: to identify and assess threats on the corporate network and respond quickly to contain and mitigate the impact and remediate the damage.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Enterprise Social Networking: What's The Worst Case Scenario? - The BrainYard - InformationWeek

Enterprise Social Networking: What's The Worst Case Scenario? - The BrainYard - InformationWeek | ICT Security-Sécurité PC et Internet | Scoop.it
Experts weigh in on some of the biggest social security risks that threaten enterprises and how to thwart them.
No comment yet.