Barbarians Inside the Gate: Dealing With Advanced Persistent Threats

Gregory Senko, Temple University

January 2014

This IBIT Report describes how the field of information security has evolved from establishing barriers to prevent unauthorized entry to identifying threats from within a company’s own defenses. The ever-increasing sophistication of hackers’ use of malicious software (malware) to elude perimeter security and operate over extended periods creates new challenges for the IT organization. These “Advanced Persistent Threats” require new approaches and frameworks. To protect against the barbarians inside the gate, the author recommends four transformative steps to achieve more robust enterprise security. Everyone concerned about the safety of their organization’s information assets will want to take note of these recommendations.

In most corporations, perimeter security management still dominates efforts to protect corporate information assets.

Download Now


© 2014 The IBIT Report, Institute for Business and Information Technology, Fox School of Business, Temple University, Philadelphia, PA 19122, USA. All rights reserved. ISSN 1938-1271.

Speak Your Mind

*