How to mitigate the risk of Web malware infections with separation

How to mitigate the risk of Web malware infections with separation

Date: Jan 15, 2014

Here's the thing to know about malware -- if it’s not running it can’t destroy. That is, there must be a process in memory using the resident system's CPU before malware can perform its nefarious deeds. With that in mind, it is not hard to realize that the notion of which system the malware is "resident" on becomes crucial to determining the extent of the damage from any infection. Separating that process from other production services can reduce that damage. In this video expert Peter Lindstrom explains how separation can protect your system from Web-borne malware.

About the speaker: Pete Lindstrom is principal of Spire Security, an industry analyst firm addressing challenges in technology risk management and cybersecurity economics. In his 20+ year career, he has held other industry analyst positions at Burton Group and Hurwitz Group, as well as enterprise positions as a security architect for Wyeth Pharmaceuticals and an IT auditor for PwC and GMAC Mortgage. Lindstrom is a frequent speaker and writer on information security topics and is a director of the International Systems Security Association (ISSA). He has a finance degree from the University of Notre Dame.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: