LEADER 02319nam 2200397 450 001 9910172654803321 005 20230419085706.0 010 $a1-5090-4542-2 035 $a(CKB)3710000001361570 035 $a(NjHacI)993710000001361570 035 $a(EXLCZ)993710000001361570 100 $a20230419d2016 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a2016 11th International Conference on Malicious and Unwanted Software (MALWARE) /$fInstitute of Electrical and Electronics Engineers 210 1$aPiscataway :$cIEEE,$d2016. 215 $a1 online resource $cillustrations 311 $a1-5090-4543-0 330 $aThe Focus of the conference this year is twofold (1) Security architectures & reformulated solutions, and (2) The demise of traditional end point protection The topics are described in the paragraphs below In the past, the security protection model that most organizations applied to protect their infrastructure was simply the Everything but the Kitchen Sink model meaning, add devices that protect the enterprise network perimeter (Trusted Zone), add devices that protect your mobile device, add devices that protect your data base, and on, and on In essence, this model simply amounted to the accumulation of security devices Given the increased number, scope, and frequency of breaches in the last few years, it is clear that this model has failed Security products are no longer about single or even multiple independent security devices each providing close as we can get to perfect standalone protection MALCON will explore alternative architectures and solutions. 517 $a2016 11th International Conference on Malicious and Unwanted Software 606 $aMalware (Computer software) 606 $aComputer networks$xSecurity measures$vCongresses 606 $aComputer software$vCongresses 615 0$aMalware (Computer software) 615 0$aComputer networks$xSecurity measures 615 0$aComputer software 676 $a005.8 801 0$bNjHacI 801 1$bNjHacl 906 $aPROCEEDING 912 $a9910172654803321 996 $a2016 11th International Conference on Malicious and Unwanted Software (MALWARE)$92513475 997 $aUNINA