Sponsored by ComputerWeekly.com
Today there is an urgent emphasis being placed by vendors on the need for antivirus to be installed on an increasing number of computing platforms used within organisations. The aim of this is to satisfy risk controls while also forming part of an organisation’s technical information security strategy. This market demand for antivirus has led to a number of security products which do little to actually protect the user, their data or the organisation. Access >>>
Table of contents
- The ineffective nature of signature and heuristics based AV
- Heuristics are readily bypassed
- Security Products are not always secure products
Premium Content for Free.
More Premium Content Accessible For Free
Social Engineering in IT Security
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
Gartner: Digital transformation: How to survive the information crisis
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...
Deloitte CIO Survey 2014
Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.