<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Defending Against Zero-Day Threats</title>
	<atom:link href="http://www.gfi.com/blog/defending-zeroday-threats/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/defending-zeroday-threats/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=defending-zeroday-threats</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Perry B.</title>
		<link>http://www.gfi.com/blog/defending-zeroday-threats/comment-page-1/#comment-29878</link>
		<dc:creator>Perry B.</dc:creator>
		<pubDate>Thu, 06 Oct 2011 12:00:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3468#comment-29878</guid>
		<description><![CDATA[For me, the best defense against zero-day threat is no other than zero threat protection. Think of it as the complete opposite of zero-day threat.

The principle behind this is that software engineers should protect any form of software against new attacks even before vulnerability is presented to them. Sounds impossible to do, but in reality it&#039;s not. 

At present, where information is easily disseminated and cloud-computing is on the rise, zero-threat protection is very plausible.]]></description>
		<content:encoded><![CDATA[<p>For me, the best defense against zero-day threat is no other than zero threat protection. Think of it as the complete opposite of zero-day threat.</p>
<p>The principle behind this is that software engineers should protect any form of software against new attacks even before vulnerability is presented to them. Sounds impossible to do, but in reality it&#8217;s not. </p>
<p>At present, where information is easily disseminated and cloud-computing is on the rise, zero-threat protection is very plausible.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Charles Clane</title>
		<link>http://www.gfi.com/blog/defending-zeroday-threats/comment-page-1/#comment-29809</link>
		<dc:creator>Charles Clane</dc:creator>
		<pubDate>Thu, 29 Sep 2011 11:02:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3468#comment-29809</guid>
		<description><![CDATA[Heuristics is the best weapon against Zero-Day threats. I don&#039;t say patches and updated antivirus are useless but when they do not contain the remedy against the attack, they don&#039;t help a lot. The worst with Zero-Days is that you might be totally oblivious to the fact that you got hacked.]]></description>
		<content:encoded><![CDATA[<p>Heuristics is the best weapon against Zero-Day threats. I don&#8217;t say patches and updated antivirus are useless but when they do not contain the remedy against the attack, they don&#8217;t help a lot. The worst with Zero-Days is that you might be totally oblivious to the fact that you got hacked.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/defending-zeroday-threats/comment-page-1/#comment-29756</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Thu, 22 Sep 2011 07:48:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3468#comment-29756</guid>
		<description><![CDATA[Hi Alicia,

I totally agree with your regular backups with multiple restore points. In case things go wrong, that can definitely save you!]]></description>
		<content:encoded><![CDATA[<p>Hi Alicia,</p>
<p>I totally agree with your regular backups with multiple restore points. In case things go wrong, that can definitely save you!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Depak Rasveh</title>
		<link>http://www.gfi.com/blog/defending-zeroday-threats/comment-page-1/#comment-29737</link>
		<dc:creator>Depak Rasveh</dc:creator>
		<pubDate>Tue, 20 Sep 2011 21:55:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3468#comment-29737</guid>
		<description><![CDATA[I&#039;ve been working as a system admin for almost five years now - all I can say is that patch management always, almost work all the time - with 99 percent success rate. Bugs, malwares, and other forms of security threats and vulnerabilities can be fixed with an efficient patch management system. 

Although patch management can&#039;t solved and detect all threats, it can help contain what could have been a much bigger problem. It&#039;s a real life saver for me. 

Also, if I may add, aside from patch management and vulnerability scanning, you can also try to integrate penetration testing to your system to defend against zeroday threats.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;ve been working as a system admin for almost five years now &#8211; all I can say is that patch management always, almost work all the time &#8211; with 99 percent success rate. Bugs, malwares, and other forms of security threats and vulnerabilities can be fixed with an efficient patch management system. </p>
<p>Although patch management can&#8217;t solved and detect all threats, it can help contain what could have been a much bigger problem. It&#8217;s a real life saver for me. </p>
<p>Also, if I may add, aside from patch management and vulnerability scanning, you can also try to integrate penetration testing to your system to defend against zeroday threats.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alicia Mirin</title>
		<link>http://www.gfi.com/blog/defending-zeroday-threats/comment-page-1/#comment-29736</link>
		<dc:creator>Alicia Mirin</dc:creator>
		<pubDate>Tue, 20 Sep 2011 19:06:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3468#comment-29736</guid>
		<description><![CDATA[Heuristic analysis is invaluable. Another thing that works in smaller organizations is maintaining regular backups and restore points. While some things can be lost in the process, for a particularly debilitating attack rewinding the tape can be useful. However, ultimately it won&#039;t prove to be any good unless you can pinpoint the cause of infection.]]></description>
		<content:encoded><![CDATA[<p>Heuristic analysis is invaluable. Another thing that works in smaller organizations is maintaining regular backups and restore points. While some things can be lost in the process, for a particularly debilitating attack rewinding the tape can be useful. However, ultimately it won&#8217;t prove to be any good unless you can pinpoint the cause of infection.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 14:16:31 by W3 Total Cache --