Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

How network traffic analysis helps defeat advanced malware

In this podcast learn how advanced malware works and why network traffic analysis is essential to protect your enterprise's network.

FROM THE SECURITY SCHOOL:

Knock advanced malware out cold with network anomaly detection

SECURITY SCHOOL SECTIONS

  1. Articles
  2. Presentation
  3. Audio
+ Show More

In this podcast, Peter Sullivan explores the nature of advanced malicious software, otherwise known as malware, and why security pros must change their focus immediately to include examining the interior of the network and not just its perimeter. Security processes that include network traffic analysis, he explains, is crucial to rooting out malware attacks before they’ve destroyed or compromised your network and data.

Using the Stuxnet malware as a case study, Sullivan notes how what distinguishes malware from advanced malware, including the latter’s ability to affect physical systems and its aim to compromise the integrity, confidentiality and/or operability of the victim’s data or systems. He reviews its key features and modes of operation.

What’s necessary now is a fundamental shift in how security teams approach the defense of their network. Denial of infiltration at the perimeter is only one part of an effective security strategy. InfoSec pros must now focus on both the perimeter and the interior of the network. Sullivan reviews the ways this can be done, including with network traffic analysis. This currently underutilized tool can help you fight back against advanced malware.

 

This was last published in July 2015

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

Knock advanced malware out cold with network anomaly detection

SECURITY SCHOOL SECTIONS

  1. Articles
  2. Presentation
  3. Audio

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

This pod cast has me thinking of networks now as defenses from medieval times.  Multiple layers of walls, moats, bridges, etc.  I think he's right though, we need to start looking at profiles of data and seeing if we can catch these breaches before they've gotten away with their prize.
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close