Tuesday 31 May 2016

Knowledge of attack patterns key to protecting digital operations

Companies and organizations must be able to first identify all cyberattack patterns in an attempt to develop a reliable protection system for their internet-based operations, an executive from a leading cybersecurity systems company suggested.

Speaking to reporters in Jakarta on Monday, Palo Alto Networks’ senior manager for the marketing of Supervisory Control and Data Acquisition ( SCADA ) system and Industrial Control System ( ICS ) products, Delfin Rodillas, said that “security alone is not enough” as something grander is needed to protect users from harmful emails and URLs.

Most data security servers in Indonesia, however, are not yet able to identify threats at the level they should, Rodillas said.

“If we are able to identify the core of these methods, then we are able to prevent attacks and block harmful users straight from the core before they even achieve the impact that they want,” said the executive of the California-based company. For the full article click here 



from cyber security caucus http://ift.tt/1XLQCy3
via IFTTT

No comments:

Post a Comment