1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Securing the enterprise digital footprint

Discussion in 'Network World' started by RSS, Aug 24, 2015.

  1. RSS

    RSS New Member Member

    This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

    In late 2007, AOL security researcher William Salusky and his team discovered one of the first reported instances of malvertising -- a digital ad running on aol.com had been configured to serve up malware to unsuspecting visitors. This turned out to be the beginning of a new era where attackers use a company’s digital footprint (web infrastructures and mobile apps) to distribute malware and commit fraud.

    For security teams, protecting the digital footprint, which resides outside the firewall, poses three distinct challenges. Namely, securing assets you know about, securing assets you don’t know about (like those created by someone within the organization or by an authorized third-party), and identifying rogue assets that are impersonating the organization’s brand or sub-brands.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page