Linux News
The world is talking about GNU/Linux and Free/Open Source Software
Managing the insider threat through code obfuscation
Corporations spend billions building effective security protocols, but complacency and a desire for efficiency can soon lead to deviations from security protocols that workers gradually become accustomed to. The result is that small but potentially crippling holes develop in even the most effective systems, creating openings for attackers, including, potentially, insiders. Countering the insider threat requires a comprehensive, multi-tiered approach that includes physical controls, software access controls, and software protection/obfuscation.
|
|
Full Story |
You cannot post until you login.