Defence in depth: how a layered approach to security can inhibit cyber attackers

clock

MWR InfoSecurity's Donato Capitella examines how to limit the impact of a cyber attack

In the first article, we looked at how attackers are commonly exploiting networks to exfiltrate, modify data, or carry out denial of service (DoS) attacks. A range of defensive measures were then i...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Fortinet addresses critical vulnerability in FortiClientLinux

Threats and Risks

FortiOS, FortiProxy, FortiClientMac and FortiSandbox also patched

clock 12 April 2024 • 3 min read
Fortinet appliances remain vulnerable to critical bug, risking cyberattacks

Threats and Risks

A significant portion of 133,000 vulnerable devices are located in Asia

clock 21 March 2024 • 2 min read
Ivanti VPN malware can survive a factory reset, warns CISA

Threats and Risks

'Assume a sophisticated threat actor may deploy rootkit level persistence'

clock 01 March 2024 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Vanta: Cybersecurity spend should be 30% of the IT budget

Vanta: Cybersecurity spend should be 30% of the IT budget

Currently it's 9% in the UK

clock 03 May 2024 • 4 min read
Security Excellence Awards – winners revealed!

Security Excellence Awards – winners revealed!

The technologies, projects, partners and people leading the way in cybersecurity

clock 03 May 2024 • 2 min read
Next's CISO: Learn from attackers to boost cyber defences

Next's CISO: Learn from attackers to boost cyber defences

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

Tom Allen
clock 02 May 2024 • 4 min read