- Intel in collaboration with McAfee
In the 1990s, most attackers were teenagers and college students looking to take down or deface corporate websites--or hackers creating malware to harvest credit card information. But newcomers have different motivations and techniques, which create additional complexity. They're slipping quietly into a network to set up bots that stay under the radar for days, weeks, or months until their mission of destruction is accomplished. This development undermines the effectiveness of traditional strategies such as using a list of signatures to screen traffic for threats.
This paper explains how enterprises, governments, and other organizations can counter the new breed of attacks--citing collaboration between that McAfee and Intel who have worked together to build a next-generation Intrusion Protection System.
Trending Discussions