The dangers posed by advanced targeted attacks are real. Enterprises have come up against the limitations of approaches such as intrusion detection and signature-based malware detection. One promising avenue to explore is trusted crypto, which can help ensure that an application, for example, is doing just what its developers intended and has not been tampered with. Things can be taken a step further with trusted execution environments.
In this webcast, John Grimm of Thales eSecurity and John Pescatore of the SANS Institute will discuss the gaps in current best-practice defenses and the ways that trusted crypto and trusted execution environments can help fill those gaps.