Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Edge Articles

12/5/2019
02:00 PM
Joan Goodchild
Joan Goodchild
Edge Features
100%
0%

10 Security 'Chestnuts' We Should Roast Over the Open Fire

These outdated security rules we all know (and maybe live by) no longer apply.

Roast: Antivirus Software Keeps Us Virus-Free

"Antivirus' efficacy is between 50% and 80% on a good day," says Nir Gaist, co-founder and CTO of Nyotron. "That doesn't mean you should run to the office and uninstall your AV. It simply means that a single line of defense doesn't cut it, and reliance on the past to stop future attacks will never provide you with a high degree of confidence. Blacklisting tools must be complemented by the whitelisting tools."

(Image: Skorzewiak, via Adobe Stock)

(Continued on next page)

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online.
View Full Bio

Previous
8 of 11
Next
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RDENAT012
100%
0%
RDENAT012,
User Rank: Apprentice
12/9/2019 | 9:07:47 AM
challenge questiions
Regarding Challenge questions.  Agree with the points made by the author.  That said, there's no reasons why the answers need to have anything to do with reality.  I give 'fraudulent' answers all the time.  Just remember to write questions & answers in your password manager.  ;-)
   OVER THE EDGE
Building Cybersecurity Strategies in Sub-Saharan Africa

Filmed for Dark Reading News Desk at Black Hat Virtual.

LAURA TICH: We have that imbalance, where the big organizations are more protected, where the smaller ones -- which are the most common businesses in the region -- they are least protected... Sometimes they do get the tools, they do get the funding to buy some critical tools, but there's a lack of skills to handle or people who understand how to work those tools. So there are a lot of factors that contribute to our growth -- or lack thereof -- in the cybersecurity industry.

 

Name That Toon: Tough Times, Tough Measures
Latest Comment: Wear a mask, please!
Flash Poll