Gregory Senko, Temple University
January 2014
This IBIT Report describes how the field of information security has evolved from establishing barriers to prevent unauthorized entry to identifying threats from within a company’s own defenses. The ever-increasing sophistication of hackers’ use of malicious software (malware) to elude perimeter security and operate over extended periods creates new challenges for the IT organization. These “Advanced Persistent Threats” require new approaches and frameworks. To protect against the barbarians inside the gate, the author recommends four transformative steps to achieve more robust enterprise security. Everyone concerned about the safety of their organization’s information assets will want to take note of these recommendations.
In most corporations, perimeter security management still dominates efforts to protect corporate information assets.
© 2014 The IBIT Report, Institute for Business and Information Technology, Fox School of Business, Temple University, Philadelphia, PA 19122, USA. All rights reserved. ISSN 1938-1271.