by 3844328 from Pixabay

Detect and block malware with known hashes. Block malicious IP addresses and host names. Create signatures for network packets or sessions. Set policies about allowed and blocked activities such as plugging in USB drives. Have we secured the network yet?

Many security operators have applied a traditional controls-oriented mindset to their strategies. They implement firewall and endpoint rules as safeguards and create company policies to block or detect practices dangerous to security. Every piece of data generated either immediately generates some sort of blocking action, or it might generate an alert for an analyst. That analyst will then determine if…

Wesley Belleman

I write about computer science, computer security, and cyber policy.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store