Managing the insider threat through code obfuscation

Posted by dave on Dec 15, 2005 3:30 AM EDT
NewsForge
Mail this story
Print this story

Corporations spend billions building effective security protocols, but complacency and a desire for efficiency can soon lead to deviations from security protocols that workers gradually become accustomed to. The result is that small but potentially crippling holes develop in even the most effective systems, creating openings for attackers, including, potentially, insiders. Countering the insider threat requires a comprehensive, multi-tiered approach that includes physical controls, software access controls, and software protection/obfuscation.

Full Story

  Nav
» Read more about: Story Type: News Story

« Return to the newswire homepage

Subject Topic Starter Replies Views Last Post
US network attacks linked to Chinese military henke54 4 1,783 Dec 21, 2005 1:26 AM

You cannot post until you login.