Access "New malware threats require new antimalware protection strategy"
This article is part of the January/February 2012 issue of Combat the latest malware threats with effective antimalware planning
While IT continues to fight increasingly clever attacks against on-site enterprise infrastructure, new malware is taking aim at lower-hanging fruit: under-secured smartphones, mobile applications, social media, and other cloud services. As workers make more extensive use of such perimeter-less platforms, they create rich targets that require new antimalware protection strategies to mitigate these multifaceted new malware threats. Enterprises can defend themselves by understanding these new malware vectors, enforcing application policies, implementing new device resident and cloud-based antimalware techniques, and leveraging other security tools. Following the money Far more than fame or hacktivism, the malware industry is driven by financial gain and drawn to low-cost, high-profit attacks. This has been repeatedly proven, as malware migrated from floppy to USB drives, email to Web, browser to PDF, abandoning old haunts to seek out more vulnerable monocultures. “As technology trends such as Web and mobile come to the forefront, that’s where malware refocuses,... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
New malware threats require new antimalware protection strategy
by Lisa Phifer
Attackers are targeting new vectors such as smartphones, social media and cloud services. Enterprises need to up their game.
-
Tackling SSL vulnerabilities for secure online transactions
by Michael Cobb, Application Security
A rash of CA breaches shows up weaknesses in the SSL infrastructure. Take action to protect your customers and employees.
-
New malware threats require new antimalware protection strategy
by Lisa Phifer
-
-
Mobile device protection: Tackling mobile device security risks
by Marcia Savage, Editor
Managing mobile device risks tops the list of priorities for security pros this year.
-
SOPA and PIPA pirating laws lose support in face of opposition
by Robert Westervelt, News Director
Security experts say there are better alternatives to copyright protection.
-
Mobile device protection: Tackling mobile device security risks
by Marcia Savage, Editor
-
Columns
-
Can a computer security researcher go too far?
by Elizabeth Martin
An examination of three cases illustrates that it’s not always a clear case of good vs. evil.
-
Ranum chat: APT attacks and malware evolution
by Marcus Ranum
Security expert Marcus Ranum talks with Joel Yonts, a seasoned security executive with a passion for information security research.
-
Security leaders help squash SOPA, PIPA pirating laws
by Michael S. Mimoso, Editorial Director
Prominent security and Internet thinkers and leaders have become an effective lobby on Capitol Hill and played a big role in squashing SOPA.
-
Can a computer security researcher go too far?
by Elizabeth Martin
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO