Businesses Should Learn Botnet Detection Methods
John Pescatore, Vice-President of Gartner Inc. while delivering a speech at the annual security confab "Gartner Security and Risk Management Summit" of the research company held in Washington DC suggested that businesses should invest more resources for maintaining defense against botnets and become skilled at recognizing the threats. The reason he gave for it was that botnets were likely to be the most prevalent method for serving malware for the next two years, as reported by Searchsecurity.techtarget on June 22, 2010.
Pescatore stated that 2009 had been full of dramatic headlines describing online attacks targeted at reputed entities like the Defense Department and Google. However, the fundamental delivery mode of the exploits followed a familiar model, as reported by Internetnews on June 22, 2010.
The Vice-President argued that it wasn't that botnet assaults were getting terribly sophisticated, as reported by Esecurityplanet on June 22, 2010. Pescatore thought that botnet attacks were rather proving as utterly resilient while giving their perpetrators a passage to corporate computers when businesses were embracing fresh techniques like social networks, virtualization, and the cloud.
Indeed as botnet attacks become resilient, threats of other kinds that are more advanced have been averted like SOA (service-oriented architecture) mechanisms or attack codes targeting hypervisors.
Curiously, Gartner says that botnet attacks will transform by 2013-end, giving way to new techniques of online assaults.
According to Pescatore, till 2015, the research company expects that 90% of all effective online assaults will exploit known security flaws or else those hitherto unknown.
Importantly, Nicholas Brigman a conference attendee, who's a Reston director, Virginia-based CompuCom Systems Inc., an IT services company, agreed to what Pescatore assessed, pointing out that being a provider of managed services, it was a continuing struggle for fighting bot-networks and malware, as reported by Searchsecurity.techtarget.
According to Brigman, many organizations had invested in techniques such as IPS, IDS, SIEM, along with anti-virus. While none of the tools were sending out warnings, these companies continued to get compromised. That underscored how several businesses hadn't utilized own IT security budgets, prudently, Brigman concluded.
Related article: Businesses Asked To Shoulder Security Of Online Transactions
» SPAMfighter News - 30-06-2010