Novell Cool Solutions

Novell on Aurora Breach – new threats to watch



By:

February 2, 2010 2:26 pm

Reads:131

Comments:0

Score:Unrated

Guest post – Brian Singer, Security Solutions Manager, Novell

Security folks have been saying for some time now  that organizations need to take a long, hard look at how they think about information security. Now that intellectual property is the target of attacks, the stakes are higher. Organizations must start from the assumption that no endpoint is secure and build their security programs around that hypothesis. In this world, authentication is not enough-the underlying activities could still be malicious.

In this podcast, I discuss with Novell security specialist, Ben Goodman, how the Aurora breach has shined a spotlight on the failure of the traditional perimeter security model. The response to these threats must be multi-faceted. Ultimately, we believe the solution may lie in systems that tie together all the information available within an enterprise. Mining that wealth of information for inconsistencies, and putting a lens to the fine-grained activities that are taking place will lead organizations to broad-based user-activity monitoring. Any time a valuable asset is accessed, systems will check to see if that access is consistent with what’s expected – anything out of the ordinary will trigger alarms or could shut down access completely.

What are your thoughts on the Aurora breach? Post your comments and let’s start a discussion.

0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this post.
Loading...Loading...

Tags: , , , , , , ,
Categories: Expert Views, General, PR Blog

0

Disclaimer: This content is not supported by Novell. It was contributed by a community member and is published "as is." It seems to have worked for at least one person, and might work for you. But please be sure to test it thoroughly before using it in a production environment.

Comment

RSS