Examining The Evolution of Malware and Next Gen Endpoint Protection

 

 

The Information Age may just as well be known as the age of the data breach. Malware co-developed almost simultaneously with the advent of the Information Age.

Creeper, the first known computer virus, was developed in 1971, just three years after the creation of the ARPAnet. Creeper would not look unfamiliar to a modern information security professional. It spread unchecked through the primitive internet, displaying the text “I’m the Creeper. Catch me if you can!” on affected mainframes.

Endpoint_Buyers_Guide_No_DLDon’t Get Hacked. 

Compare Top Endpoint Security Providers with the 2016 Endpoint Security Buyer’s Guide.

  • 24 Vendor Profiles and Capabilities References
  • 10 Top Questions for Buyer’s
  • Complete Market Overview
Download

Shortly thereafter, a different program—Reaper—was developed. Its only purpose was to delete Creeper. It was the first antivirus software. From that playful beginning, malware detection and interception developed into its present-day arms race.

Today, endpoint protection has moved far beyond basic malware scanning—it’s  now a commodity of information security. Now, as Malware evolves into targeted Advance Persistent Threats, any response has to be layered, proactive, and highly visible.

In this 47-slide presentation, InfoSec pros from Panda Security walk us through the history of malware, how it’s changed, and what we can do to fight back.

Jeff Edwards
Follow Jeff

Jeff Edwards

Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff

Leave a Reply

Your email address will not be published. Required fields are marked *