iTnews
  • Home
  • News
  • Technology
  • Security

RSA 2010: Encryption and anti-virus are failing, warn experts

By Iain Thomson on Mar 3, 2010 2:22PM

Traditional approaches growing increasingly useless.

The effectiveness of traditional anti-virus and encryption systems is failing, according to a panel of experts at the RSA 2010 conference in San Francisco

Currently, successful detection rates for popular anti-virus packages were between 70-90 per cent of all samples, said Ed Skoudis, co-founder of security consultants InGuardians.

While he said increased use of heuristics and behavioural monitoring may be helping overall, the outlook is not rosy, but companies should still use such systems.

“Don't throw the baby out with the bathwater,” he said.

“It helps to cut down on some on the clutter but we can't have just that as a single point of protection any more.”

The best defence from an IT administrator's perspective was vigilance, he said. In particular, admins should check outbound web proxies for either excessive activity or suspicious connection points. Logs of DNS resolution failures were also a useful source, he said.

Companies should be segmenting their networks with internal firewalls to minimise the effect of any outbreaks, he warned.

Dr. Johannes Ullrich, chief technology officer of the Internet Storm Center SANS, agreed, saying that network segmentation was vital to effective security.

Dr. Ulrich also warned against over-reliance on encryption and, in particular, SSL.

“Encryption is becoming a losing battle. You have to overbuild on encryption now - pick the strongest cypher you can and then re-encrypt with another package.

He said that there were increasing problems with SSL as an encryption tool. Man-in-the-middle attacks, where a hacker oversees an encrypted traffic stream, disrupts the connection, and then reconnects with one side to harvest data, are becoming increasingly commonplace.

Ultimately, the best protection for a network, Skoudis concluded, were the IT administrators themselves.

“Stop looking for the silver bullet, there isn't one, it won't happen,” he said.

“There is no silver bullet, except possibly you. Build your skills up. What if we're the defence we've all been waiting for?”

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:
2010andantivirusareencryptionexpertsfailingrsasecuritywarn

Partner Content

How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Iain Thomson
Mar 3 2010
2:22PM
0 Comments

Related Articles

  • HTTP/3 becomes a standard, at last
  • Google open sources data centre scale encryption
  • Researchers identify FIDO2 protocol vulnerabilities
  • Google's VirusTotal service vulnerable for over eight months
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

PayTo rollout kicks off

PayTo rollout kicks off

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.