Information Security Research Library

Powered by Bitpipe.com

ABSTRACT:

You just can’t cut corners today. In fact you need to be very careful about even “optimizing” your security efforts because it’s so easy to misjudge what needs to be secured and what doesn’t; what deserves your attention and what doesn’t.

Today most Security Professions “get it” that endpoints are just as important as servers. But there are so many of them and there are so many more threat vectors on endpoints than on servers. How do we manage them all? For example, Flame has shown that Attackers only needed to infect a single system belonging to a low-level user and they had a chance to infect other, so-called “high-value” systems assigned to users with access to the information they wanted. So you can’t just protect your important systems because, well, they’re all important.

(THIS RESOURCE IS NO LONGER AVAILABLE.)

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.