The Information Age may just as well be known as the age of the data breach. Malware co-developed almost simultaneously with the advent of the Information Age.
Creeper, the first known computer virus, was developed in 1971, just three years after the creation of the ARPAnet. Creeper would not look unfamiliar to a modern information security professional. It spread unchecked through the primitive internet, displaying the text “I’m the Creeper. Catch me if you can!” on affected mainframes.
- 24 Vendor Profiles and Capabilities References
- 10 Top Questions for Buyer’s
- Complete Market Overview
Shortly thereafter, a different program—Reaper—was developed. Its only purpose was to delete Creeper. It was the first antivirus software. From that playful beginning, malware detection and interception developed into its present-day arms race.
Today, endpoint protection has moved far beyond basic malware scanning—it’s now a commodity of information security. Now, as Malware evolves into targeted Advance Persistent Threats, any response has to be layered, proactive, and highly visible.
In this 47-slide presentation, InfoSec pros from Panda Security walk us through the history of malware, how it’s changed, and what we can do to fight back.
- Six Endpoint Security Vendors to Watch in 2018 - November 28, 2017
- Bitdefender Releases Cloud-Based Endpoint Detection and Response Tool - November 13, 2017
- CrowdStrike Adds Vulnerability Management Module to It’s Endpoint Protection Platform - November 10, 2017