Ad Image

Examining The Evolution of Malware and Next Gen Endpoint Protection

 

 

The Information Age may just as well be known as the age of the data breach. Malware co-developed almost simultaneously with the advent of the Information Age.

Creeper, the first known computer virus, was developed in 1971, just three years after the creation of the ARPAnet. Creeper would not look unfamiliar to a modern information security professional. It spread unchecked through the primitive internet, displaying the text “I’m the Creeper. Catch me if you can!” on affected mainframes.

Endpoint_Buyers_Guide_No_DLDon’t Get Hacked. 

Compare Top Endpoint Security Providers with the 2016 Endpoint Security Buyer’s Guide.

  • 24 Vendor Profiles and Capabilities References
  • 10 Top Questions for Buyer’s
  • Complete Market Overview
Download

Shortly thereafter, a different program—Reaper—was developed. Its only purpose was to delete Creeper. It was the first antivirus software. From that playful beginning, malware detection and interception developed into its present-day arms race.

Today, endpoint protection has moved far beyond basic malware scanning—it’s  now a commodity of information security. Now, as Malware evolves into targeted Advance Persistent Threats, any response has to be layered, proactive, and highly visible.

In this 47-slide presentation, InfoSec pros from Panda Security walk us through the history of malware, how it’s changed, and what we can do to fight back.

Share This

Related Posts