O'Reilly logo

Securing the Borderless Network: Security for the Web 2.0 World by Tom Gillis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Signs of Hope

This chapter includes the following topics:

Harnessing the Network

Scanning for Signatures

Behavioral Analysis of Bad Code

The Power of Reputation

Global Threat Correlation

Combining Countermeasures

The arms race between malware creators and security vendors isn’t about to let up. Because there is profit to be made, malware will keep getting smarter, faster, and more dangerous. However, as you will read in this chapter, there is reason to believe that the security industry can combat threatening malware attacks and keep the Internet a generally (if not completely) safe place.

But delivering a “generally safe” Internet experience means IT professionals need to stay current on the latest technologies, and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required