Arresting cyberespionage

Arresting cyberespionage
Arresting cyberespionage
If ever there was any doubt whether the security industry had found a way to stop cyberespionage, the activities of the past few months should put that to rest. Hactivist groups Anonymous and LulzSec have made it clear that no computer network, not even those of security companies, are immune from penetration. Enhanced spam-filtering technology and increased user awareness are critical in combatting cyber offenses, but companies must assume their systems are already breached and should therefore analyze their network for inappropriate activity. Perhaps today's top challenge facing senior IT personnel is to get the C-suite to sign off on implementing a 24/7 security system before the enterprise suffers a breach.
close

Next Article in Research

Sign up for our newsletters

POLL

More in Research

Mobile security

Mobile security

BYOD has enhanced productivity, but increased security concerns.

Virtualization

Virtualization

Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation ...

Application security

Application security

The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."