Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Challenging Defence in Depth

Ross O. Storey | Dec. 21, 2010
Innovation, delegation and motivation are the key characteristics that Nir Zuk, Co-founder and Chief Technology Officer, with Palo Alto Networks, believes have contributed most to his business achievements and success.

I foresee hackers will start to use more web 2.0 applications to launch malware attacks via multiple-attack vectors to hack into the networks. Hackers are going to use social media applications for hacking as thats the easiest way to get into organizations today. Social networks have become the transmission vector for old and new threats hundreds of millions of users are a huge target and threat developers are reacting accordingly.   I think youre going to see multiple-attack combination of technologies. For example, spyware can now spread in multiple ways, including via drive by downloads users get it from downloading seemingly useful applications only to find that you get spyware installed. To detect such malware, you need intrusion prevention, anti-virus, URL filtering technology, and anti-call back. Therefore, you cannot have separate technologies working in silos against these threats. You need to integrate all of these technologies into a holistic one that can actually combat these threats effectively.


Previous Page  1  2  3 

Sign up for Computerworld eNewsletters.