The fight to stay ahead of the latest hacker schemes has created a volatile arena for players in the security field. We have watched antivirus software flounder with the rise of ‘crypting’ services. We have witnessed malware sandboxing and its struggles with evasion techniques. And the race is far from over.

With the rapid changes in automating and connecting our systems, the adoption of SaaS and IaaS is only on the rise—and those who want to profit from theft of this data are paying close attention. This is a familiar pattern: One team gets an advantage for a short time, long enough for the other team to find a weakness, and the cycle is repeated. 

Register or login for access to this item and much more

All Information Management content is archived after seven days.

Community members receive:
  • All recent and archived articles
  • Conference offers and updates
  • A full menu of enewsletter options
  • Web seminars, white papers, ebooks

Don't have an account? Register for Free Unlimited Access