For years, signature-based security alone provided fast, reliable protection from most known attacks, but hackers have learned to avoid easily identified attacks with tactics that are stealthy, evasive, defense-aware, and intelligently adaptive. Signature-based detection provides an important foundation for intrusion inspection but clearly, something more must be done. Malware attacks can be identified and stopped with high levels of accuracy and reliability by layering three types of analytical techniques over a conventional signature-based defense. This analysis explains how attacks can occur-- and how to prevent them.
August 13, 2014
Download Paper More resources from McAfee
Tweet Follow @webtorials
Secure Beyond the Signature
Tweet Follow @webtorials
Leave a comment