Posted by Anton Aylward
Let us pass over the "All A are B" illogic in this and consider what we've known all along. AV doesn't really work; it never did.
Signature based AV, the whole "I'm better than you cos I have more signatures in my database" approach to AV and AV marketing that so bedazzled the journalists ("Metrics? You want metrics? We can give you metrics! How many you want? One million? Two million!) is a loosing game. Skip over polymorphism and others. The boundary between what actually works and what works for marketing blurs.
So then we have the attacks on the 'human firewall' or whatever the buzz-word is that appears in this month's geek-Vogue magazines, whatever the latest fashion is. What's that? Oh right, the malware writers are migrating to Android the industry commentators say. Well they've tried convincing us that Linux and MacOS were under attack and vulnerable, despite the evidence. Perhaps those same vendor driven - yes vendors try convincing Linux and Apple users to buy AV products, just because Linux and MacOS ran on the same chip as Microsoft they were just as vulnerable as Microsoft, and gave up dunning the journalists and advertising when they found that the supposed market wasn't convinced and didn't buy.
That large software production is buggy surprises no-one. There are methods to producing high quality code as NASA has shown on its deep space projects, but they are incompatible with the attitudes that commercial software vendors have. They require an discipline that seems absent from the attitudes of many younger coders, the kind that so many commercial firms hire on the basis of cost and who are drive by 'lines of code per day' metrics, feature driven popularity and the 'first to market' imperatives.
So when I read about, for example, RSA getting hacked by means of social engineering, I'm not surprised. Neither am I surprised when I hear that so many point of sales terminals are, if not already infected, then vulnerable.
But then all too many organization take a 'risk-based' approach that just is not right. The resistance that US firms have had to implementing chi-n-pin credit card technology while the rest of the world had adopted it is an example in point. "It was too expensive" - until it was more expensive not to have implemented it.
[ buy viagra in uk | viagra results | viagra clones | selling viagra | best viagra alternative | how much is viagra | make your own viagra | cialis levitra viagra vs | herbal v viagra study | cialis samples | viagra produced in mexico | cialis canada illegal buy | viagra blog | us cialis | viagra non prescription | what does viagra look like | viagra uk purchase | viagra jokes | cheap less viagra | generic viagra ok | generic ogden viagra | non pescription cialis | get cialis online | viagra without prescription | cialis drug viagra vs | baby on viagra | buy pfizer viagra | what does viagra look like | female version of viagra | viagra online sales | buy viagra mexico | cialis woman | how to buy viagra | bad side effects of viagra | viagra purchase | viagra no prescription | viagra with no prescription | female viagra response | viagra benefits side effects | viagra generic | viagra online pharmacy | generic cialis in india | free viagra sample | cialis tablets foreign | viagra no prescription | viagra collection service | female version viagra | woman and cialis | ladies viagra | how can i make homemade viagra | viagra pills | low price cialis | cheap viagra 50mg | viagra facts ]
Posted by Anton Aylward
If you have a good information security awareness amongst
the employees then it should not a problem what kind of attempts
are made by the social engineers and to glean information from
Yes but as RSA demonstrated, it is a moving target.
You need to have it as a continuous process, educate new hires and educate on new techniques and variations that may be employed by the 'social engineers'. Fight psychology with psychology!
[ online generic cialis 100 mg | buy viagra without a prescription | best prices on viagra | us cialis | names of herbal viagra | viagra overnight | viagra for women | viagra discussion board | viagra in canada | viagra online 50mgs | cialis usa | cialis strenght mg | viagra for sale in gibralter | overseas viagra | order viagra 1 | how to make your own viagra | sildenafil oral jelly | where can i buy real viagra | viagra 6 free samples | fx.blogspot.com generic viagra | how does viagra work | buy pfizer viagra in canada | viagra soft | buy kazazz shopping viagra | buy viagra low cost | next day delivery of cialis | cialis overnight | buy viagra uk | how quick does a cialis work | pfizer viagra canada | cialis online sales | cheap robert.up2.co.il viagra | cialis dosagem | when do i use cialis | young men taking viagra | low price cialis | buying generic cialis mexico rx | real viagra without prescription | viagra professionsl | female viagra pills | buy pfizer viagra online | buy cheap viagra in uk | order viagra no prescription | canada viagra | viagra prescription drug | online cialis | generic viagra canada | viagra picture | buy cialis online uk | long term effects of viagra | how long does viagra last | buy viagra pill | which is better viagra or cialis | female viagra uk ]
I am currently available to offer InfoSec & GRC audit and consulting services through my company - System Integrity
Calendar of Posts