Paul Heffernan, Group CISO, Unipart Group

Moving from File Locking to Behavior Locking

  • With malware variants being generated far faster than any signature-based security solution can possibly keep up with, signature detection is not enough.
  • Machine learning and artificial intelligence are critical tools for early threat detection, but they still require help from humans.

“The first thing we are doing is applying the principle of least privilege to behavioral locking and restriction, rather than file locking and restriction.”

In the past, a “set-it-and-forget-it” security strategy had a certain appeal. The role of security has always been to reduce risk to the company without obstructing business. The goal was to be a business enabler. The approach made it possible to provide security at the pace of business operations.

This is an excerpt from 10 Experts on Active Threat Management. The eBook was generously sponsored by CounterTack.