1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Hacking operations are as vulnerable as a house of cards

Discussion in 'Network World' started by RSS, Feb 19, 2016.

  1. RSS

    RSS New Member Member

    Last month I met with the security team at a major bank to discuss their detection capabilities. The head of the bank’s security operation center claimed that his organization’s security stack could detect certain threats but he was worried about them missing other attack vectors. He asked his team to figure out how to close this security gap and, during our meeting, they were listing the pros and cons of buying a solution and building their own system.

    As the security team debated the merits and drawbacks of each method, I surprised them by saying their whole approach was wrong. For years, practicing security meant building a fence to keep adversaries out, plugging any holes that appeared and fortifying the fence as the attacks grew more advanced.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page