<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Why being Proactive in Security is Essential</title>
	<atom:link href="http://www.gfi.com/blog/proactive-security-essential/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/proactive-security-essential/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=proactive-security-essential</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Ralph</title>
		<link>http://www.gfi.com/blog/proactive-security-essential/comment-page-1/#comment-17550</link>
		<dc:creator>Ralph</dc:creator>
		<pubDate>Tue, 04 Jan 2011 22:07:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3045#comment-17550</guid>
		<description><![CDATA[There’s a lot of discussion going around on how pro-activity can be implemented in a field that is mostly reactive. However, with the right tools, training, and foresight I believe that security can reach a point where it is able to anticipate (maybe not all, but most) possible threats both in the present and in the near future. This will allow companies to better adjust their systems to address more likely threats. As cliché as it may sound, a great offense does prove to be the best defense. And when it comes to security, I think this saying holds a lot of truth.]]></description>
		<content:encoded><![CDATA[<p>There’s a lot of discussion going around on how pro-activity can be implemented in a field that is mostly reactive. However, with the right tools, training, and foresight I believe that security can reach a point where it is able to anticipate (maybe not all, but most) possible threats both in the present and in the near future. This will allow companies to better adjust their systems to address more likely threats. As cliché as it may sound, a great offense does prove to be the best defense. And when it comes to security, I think this saying holds a lot of truth.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: don turpin</title>
		<link>http://www.gfi.com/blog/proactive-security-essential/comment-page-1/#comment-17545</link>
		<dc:creator>don turpin</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:51:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3045#comment-17545</guid>
		<description><![CDATA[@Calvin

But given the ever changing landscape of security (especially from a technological standpoint), how aggressive is one expected to be? I think in another article posted by GFI blog, IT companies are encouraged to strike a balance between convenience and security, but with a conscious mandate on aggressive and pro-active security, does that mean that we should be doing without the convenience and comfort of our clients for the sake of security?]]></description>
		<content:encoded><![CDATA[<p>@Calvin</p>
<p>But given the ever changing landscape of security (especially from a technological standpoint), how aggressive is one expected to be? I think in another article posted by GFI blog, IT companies are encouraged to strike a balance between convenience and security, but with a conscious mandate on aggressive and pro-active security, does that mean that we should be doing without the convenience and comfort of our clients for the sake of security?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ellen Hall</title>
		<link>http://www.gfi.com/blog/proactive-security-essential/comment-page-1/#comment-17057</link>
		<dc:creator>Ellen Hall</dc:creator>
		<pubDate>Tue, 28 Dec 2010 05:24:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3045#comment-17057</guid>
		<description><![CDATA[Infecting the network card firmware with malware? Definitely, frightening stuff. But since it was done in a controlled lab environment, I wonder how something like this would play out in a real world scenario. I bet it’s much harder than it sounds. Infecting the critical systems of hardware itself is no cake walk. Does this mean that hardware firmware will start requiring their own security protocols? That’s pretty ridiculous by any stretch of the imagination.]]></description>
		<content:encoded><![CDATA[<p>Infecting the network card firmware with malware? Definitely, frightening stuff. But since it was done in a controlled lab environment, I wonder how something like this would play out in a real world scenario. I bet it’s much harder than it sounds. Infecting the critical systems of hardware itself is no cake walk. Does this mean that hardware firmware will start requiring their own security protocols? That’s pretty ridiculous by any stretch of the imagination.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Calvin</title>
		<link>http://www.gfi.com/blog/proactive-security-essential/comment-page-1/#comment-16994</link>
		<dc:creator>Calvin</dc:creator>
		<pubDate>Mon, 27 Dec 2010 06:41:06 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3045#comment-16994</guid>
		<description><![CDATA[@Nelson

I have to agree with Emmanuel on this. Proactive security simply means taking a more aggressive disposition towards system security. A lot of people (and even professional IT specialists) mistake security as a passive / reactive solution to external threats. A combination of good access control, updated software, reliable end point security, as well as excellent antivirus and intrusion detection systems (as Emmanuel mentioned) are great ways of achieving this.]]></description>
		<content:encoded><![CDATA[<p>@Nelson</p>
<p>I have to agree with Emmanuel on this. Proactive security simply means taking a more aggressive disposition towards system security. A lot of people (and even professional IT specialists) mistake security as a passive / reactive solution to external threats. A combination of good access control, updated software, reliable end point security, as well as excellent antivirus and intrusion detection systems (as Emmanuel mentioned) are great ways of achieving this.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/proactive-security-essential/comment-page-1/#comment-16109</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Wed, 15 Dec 2010 09:28:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3045#comment-16109</guid>
		<description><![CDATA[@ Stevie - It&#039;s a nightmare indeed; however, security is a war so to speak - sometimes one side has the edge and other times the other side has the edge. Right now this is a new attack vector which means it&#039;s relatively unprotected. If it actually starts being used, measures will hopefully be put in place to address this better. Right now it&#039;s simply too early to say. There are some protections that a device manufacturer could take to ensure this doesn&#039;t happen, such as generating a certificate for any updating software to authenticate with the card before it allows updates for example.

@ Nelson - The steps one needs to take in order to protect against this is no different than any other scenario really. What your target is, in this case, is to prevent unauthorized and unnecessary access of the protected machine. That generally means good access control, keeping the system up to date,good end point security including antivirus and perhaps a good intrusion detection system.]]></description>
		<content:encoded><![CDATA[<p>@ Stevie &#8211; It&#8217;s a nightmare indeed; however, security is a war so to speak &#8211; sometimes one side has the edge and other times the other side has the edge. Right now this is a new attack vector which means it&#8217;s relatively unprotected. If it actually starts being used, measures will hopefully be put in place to address this better. Right now it&#8217;s simply too early to say. There are some protections that a device manufacturer could take to ensure this doesn&#8217;t happen, such as generating a certificate for any updating software to authenticate with the card before it allows updates for example.</p>
<p>@ Nelson &#8211; The steps one needs to take in order to protect against this is no different than any other scenario really. What your target is, in this case, is to prevent unauthorized and unnecessary access of the protected machine. That generally means good access control, keeping the system up to date,good end point security including antivirus and perhaps a good intrusion detection system.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Nelson Rogers</title>
		<link>http://www.gfi.com/blog/proactive-security-essential/comment-page-1/#comment-15704</link>
		<dc:creator>Nelson Rogers</dc:creator>
		<pubDate>Sun, 12 Dec 2010 16:35:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3045#comment-15704</guid>
		<description><![CDATA[I definitely agree that proactivity is essential when it comes to system security. With malware and cyber-vandalism tactics becoming even more aggressive than they originally were years ago, system admins and general computer users  can&#039;t simply rely on dated security to practices and hope to come out unscathed. As insightful as this article is, maybe you guys in GFI can suggest on how proactivity can be implemented for both average and advanced computer users.]]></description>
		<content:encoded><![CDATA[<p>I definitely agree that proactivity is essential when it comes to system security. With malware and cyber-vandalism tactics becoming even more aggressive than they originally were years ago, system admins and general computer users  can&#8217;t simply rely on dated security to practices and hope to come out unscathed. As insightful as this article is, maybe you guys in GFI can suggest on how proactivity can be implemented for both average and advanced computer users.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Stevie</title>
		<link>http://www.gfi.com/blog/proactive-security-essential/comment-page-1/#comment-15566</link>
		<dc:creator>Stevie</dc:creator>
		<pubDate>Sat, 11 Dec 2010 17:22:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3045#comment-15566</guid>
		<description><![CDATA[The idea of successfully infecting your network card firmware (or any system critical devices for that matter) with malware is quite simply a nightmare come true. Restoring your system to with a clean format has always been an end-all be-all when it comes to taking out malicious software, but it seems like these tech-vandals have really gone for the jugular on this one. And to think that the scenario was replicated in a controlled lab environment. What more in the real world?]]></description>
		<content:encoded><![CDATA[<p>The idea of successfully infecting your network card firmware (or any system critical devices for that matter) with malware is quite simply a nightmare come true. Restoring your system to with a clean format has always been an end-all be-all when it comes to taking out malicious software, but it seems like these tech-vandals have really gone for the jugular on this one. And to think that the scenario was replicated in a controlled lab environment. What more in the real world?</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:58:43 by W3 Total Cache --