Preventing Modern Attacks with Modern Defense and Testing Methodologies | 21st Century Learning and Teaching | Scoop.it

 

===> Antivirus software (AV) is a necessary, but insufficient defense mechanism in this ever so common scenario and here is why. <===

 

The first stage of these attacks commonly involves exploiting a known vulnerability. AV focuses way down on attack phase three where it focuses on protecting against a common payload.  As an industry we must shield the vulnerability. This is done best through host and network based technologies that use vulnerability shielding techniques or a more rigid technology, application control.  

 

Unlike inferior pattern matching signatures, we need to embrace this broader approach of vulnerability shielding.  These techniques have been commonly used for a decade in network devices while host based advanced protection has been more slowly adopted.

 

As noted by the recent NY Times article, now is the time.  

 

===> As an industry we must raise the bar! None of us (vendors or practitioners) can persist in believing that if we build and deploy a traditional AV certified by historical AV testing techniques, that we’ll be safe. <===