Access "Perspectives: Putting out a call for self-defending clients"
This article is part of the April 2006 issue of Security survivor all stars explain their worst data breaches
Network perimeter defenses have crumbled. What we need now are self-defending clients. Today's network perimeter is a lot like the Maginot Line, which the French built after World War I, believing its bunkers, fortresses and traps would stop invasion from the east. But the Germans defeated the tons of concrete and miles of barbed wire by simply going around it, conquering Paris in a mere 35 days. In our modern-day Maginot Network, we watch Trojans flank our firewalls just as the French soldiers watched German tanks surround their fortress. But why have static perimeter defenses become obsolete? The ubiquitous demand for mobile devices makes networks more fluid, with more entry points and increasing complexity. And worms are rapidly evolving, using clever social engineering tricks to produce an endless stream of Trojan attacks that march right through e-mail and Web ports. Your firewall is as useful as a rock in a boulder field when a trusted user naÏvely double-clicks a link and innocently installs insidious spyware on your corporate network. More from this ... Access >>>
Premium Content for Free.
Secure Reads: The Database Hacker's Handbook
Read a review of The Database Hacker's Handbook.
Recent Releases: Security product briefs, April 2006
Read about security products released in April 2006.
BITS & BOLTS SSL-encrypted tunnels protect sensitive data traveling the Information Superhighway.
Security Survivor All-Stars
COVER STORY Five security survivors tell you how to outwit, outplay and outlast the bad guys.
Antispyware / Patch Management
Shavlik Technologies' NetChk Protect 5.5
- Secure Reads: The Database Hacker's Handbook
Security Device Testing
by Steven Weil, Contributor
Karalon's Traffic IQ Pro 1.0
Get a Grip!
MOBILE SECURITY Enterprises need to take control of PDAs, smart phones and other mobile devices to ensure corporate security.
Tumbleweed's MailGate 5500
Hot Pick: F5 Network's FirePass 4100 Controller
F5 Network's FirePass 4100 Controller
- Security Device Testing by Steven Weil, Contributor
Ping: Jane Scott Norris
Jane Scott Norris
Face-Off: Schneier, Ranum debate security awareness training
Is User Education Working?
Editor's Desk: The power of one
Perspectives: Putting out a call for self-defending clients
by M. W. Meyer & Eric Sager, Contributors
Network perimeter defenses have crumbled. What we need now are self-defending clients.
- Ping: Jane Scott Norris
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...