4 Steps to Combat Malware Enterprise-Wide: New Article

Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host and then moves on with routine operational tasks. This approach doesn’t allow the enterprise to keep up with the increasingly aggressive and innovative attack tactics employed by malware authors.

Combating malware in an enterprise environment means not only locating suspicious programs on servers and workstations, but also detecting and interfering with the use of malware on the network. To win the battle for data security, enterprises must discover malware propagation attempts and contain infections before they escalate into all-encompassing pandemics.

My recent article, originally published in the Campus Technology magazine, explains how to treat malware incidents as elements of a holistic security incident cycle. If this topic interests you, read the 4 Steps To Combat Malware Enterprise-Wide article and check out the 2-day course I teach at SANS Institute on the topic of malware combat.

Lenny Zeltser


About the Author

Lenny Zeltser develops products and programs that use security to achieve business results. He is the CISO at Axonius and Faculty Fellow at SANS Institute. Lenny has been leading efforts to establish resilient security practices and solve hard security problems for over two decades. A respected author and practitioner, he has been advancing tradecraft and contributing to the community. His insights build upon real-world experience, a Computer Science degree from the University of Pennsylvania, and an MBA degree from MIT Sloan.

Learn more