02319nam 2200397 450 991017265480332120230419085706.01-5090-4542-2(CKB)3710000001361570(NjHacI)993710000001361570(EXLCZ)99371000000136157020230419d2016 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrier2016 11th International Conference on Malicious and Unwanted Software (MALWARE) /Institute of Electrical and Electronics EngineersPiscataway :IEEE,2016.1 online resource illustrations1-5090-4543-0 The Focus of the conference this year is twofold (1) Security architectures & reformulated solutions, and (2) The demise of traditional end point protection The topics are described in the paragraphs below In the past, the security protection model that most organizations applied to protect their infrastructure was simply the Everything but the Kitchen Sink model meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base, and on, and on In essence, this model simply amounted to the accumulation of security devices Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed Security products are no longer about single or even multiple independent security devices each providing close as we can get to perfect standalone protection MALCON will explore alternative architectures and solutions.2016 11th International Conference on Malicious and Unwanted Software Malware (Computer software)Computer networksSecurity measuresCongressesComputer softwareCongressesMalware (Computer software)Computer networksSecurity measuresComputer software005.8NjHacINjHaclPROCEEDING99101726548033212016 11th International Conference on Malicious and Unwanted Software (MALWARE)2513475UNINA