Description: "The mechanics of vulnerability multiplication:
what does research reveal about the reasons for a four fold increase in end point application vulnerabilities, and what questions does an analysis of the top 50 apps raise about current endpoint security strategy?
A battle on two fronts:
how has a change in the focus of cyber criminal activity challenged the effectiveness of the defense tools in the standard technical IT security arsenal, as well as striking at an area that is difficult to defend?
Time to forget signature detection? A deep dive into the key components of the malware development cycle and insights into how specialised tools are being combined by cyber criminals to automate attack stages
Aligning protective measures with the nature of the threat:
guidelines for adapting IT and security strategy to reduce endpoint risk"
Tags: securitytube , swisscyberstorm , hacking , hackers , information security , convention , computer security , cyber storm 11 , swisscyberstorm 11 , swisscyberstorm-2011 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.