This page is part of a Security School lesson, featuring a selection of expert technical content on this topic. Explore more in this school:
1. - Mitigating the risk of Web malware infections with a separation process: Read more in this section
- How to mitigate the risk of Web malware infections with separation
Explore other sections in this guide:
How to mitigate the risk of Web malware infections with separationDate: Jan 15, 2014
Here's the thing to know about malware -- if it’s not running it can’t destroy. That is, there must be a process in memory using the resident system's CPU before malware can perform its nefarious deeds. With that in mind, it is not hard to realize that the notion of which system the malware is "resident" on becomes crucial to determining the extent of the damage from any infection. Separating that process from other production services can reduce that damage. In this video expert Peter Lindstrom explains how separation can protect your system from Web-borne malware.
About the speaker: Pete Lindstrom is principal of Spire Security, an industry analyst firm addressing challenges in technology risk management and cybersecurity economics. In his 20+ year career, he has held other industry analyst positions at Burton Group and Hurwitz Group, as well as enterprise positions as a security architect for Wyeth Pharmaceuticals and an IT auditor for PwC and GMAC Mortgage. Lindstrom is a frequent speaker and writer on information security topics and is a director of the International Systems Security Association (ISSA). He has a finance degree from the University of Notre Dame.