As new regulations and legislation are mandated and existing regulations are changed, organizations face a difficult challenge in becoming compliant. To complicate matters, the language of compliance is intentionally vague and subjective in order to provide a general direction on best practices, rather than clear instructions.
In the last six months, image-based spam has pushed its way to the forefront of spam technique discussions. Image-based spam is not new, but it is now wreaking havoc on the effectiveness of many anti-spam products.
As the epidemic of spam and malware continues to barrage email systems, one might think the industry would have learned to build strong security into new communications protocols. Unfortunately, in the case of VoIP - the most important new communications protocol since SMTP - this is not true. Historically, the development of VoIP infrastructure has prioritized quality and reliability over security, with few security measures being built in.
The concept of malware morphing is not new. For years, malware authors and anti-virus researchers have documented and classified the methods used to obfuscate and hide malware code with each infection.
Over a year ago, IBM began a global conversation about how the planet is becoming smarter with an increasingly instrumented, interconnected and intelligent infrastructure. There is an explosive growth of data that is collected about virtually every aspect of our lives that we can connect and share across billions of devices with built-in intelligence. Our ability to use this data to visualize, control and automate what happens in our environment influences every aspect of our lives from financial transactions, to healthcare, retail, transportation, communications, government and utilities.