{"id":205,"date":"2014-05-05T09:09:43","date_gmt":"2014-05-05T15:09:43","guid":{"rendered":"http:\/\/www.businesstechnologyassociates.com\/blog\/?p=205"},"modified":"2014-05-05T09:09:43","modified_gmt":"2014-05-05T15:09:43","slug":"antivirus-is-dead","status":"publish","type":"post","link":"https:\/\/www.businesstechnologyassociates.com\/blog\/2014\/05\/antivirus-is-dead\/","title":{"rendered":"Antivirus is Dead!"},"content":{"rendered":"<p>So declared Brian Dye, Symantec&#8217;s senior vice president for information security. <a href=\"http:\/\/online.wsj.com\/article\/SB10001424052702303417104579542140235850578.html\" target=\"_blank\">&#8220;We don&#8217;t think of antivirus as a moneymaker in any way.&#8221;<\/a>\u00a0 Mr. Dye went on to say &#8220;antivirus now catches just 45% of cyberattacks.&#8221;<\/p>\n<p>So because they cannot make money, this segment of the software industry is dead?\u00a0 Maybe they are not any good at it!\u00a0 Or maybe it is the wrong solution to the problem.\u00a0 Or maybe it is too narrow of a solution.<\/p>\n<p>I believe that this problem can only be dealt with effectively at the operating system level.\u00a0 But the stage was set by Microsoft years ago when they allowed third party companies to deal with the problem of poor security on Microsoft Windows.\u00a0 But that is just like plugging holes in a leaking boat, it just slows down the problem.<\/p>\n<p>Microsoft has made feeble attempts to increase security on Windows\u00ae with equally feeble results.\u00a0 A code-signing mechanism was introduced in Windows called <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/ms537359%28v=vs.85%29.aspx\">Authenticode<\/a>, but even Microsoft does not use this technology to protect the integrity of all of its software.\u00a0 Microsoft finally added a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Windows_firewall\" target=\"_blank\">firewall application<\/a>, in a usable form, to the Windows operating system in 2004.<\/p>\n<p>The problem of malicious access and modification of computer systems needs to be dealt with at the lowest levels and with a variety of methods.\u00a0 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Category:Firewall_software\" target=\"_blank\">Intrusion prevention<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Category:Intrusion_detection_systems\" target=\"_blank\">intrusion detection software<\/a> are both needed to prevent system attacks.\u00a0 Many intrusion prevention solutions exist in the form of stand-alone systems like routers and applications that can be installed on end-user systems.\u00a0 For Linux systems numerous intrusion detection applications can be found such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_Intrusion_Detection_Environment\" target=\"_blank\">AIDE<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Open_Source_Tripwire\" target=\"_blank\">Tripwire<\/a>.\u00a0 There is even an cross-platform, open-source application called <a href=\"https:\/\/en.wikipedia.org\/wiki\/OSSEC\">OSSEC<\/a> that runs on Windows based systems.<\/p>\n<p>Some of these solutions are not the &#8220;next big thing&#8221; required by most &#8220;for profit&#8221; companies.\u00a0 So many solutions will come from the open-source community.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So declared Brian Dye, Symantec&#8217;s senior vice president for information security. &#8220;We don&#8217;t think of antivirus as a moneymaker in any way.&#8221;\u00a0 Mr. Dye went on to say &#8220;antivirus now catches just 45% of cyberattacks.&#8221; So because they cannot make money, this segment of the software industry is dead?\u00a0 Maybe they are not any good &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.businesstechnologyassociates.com\/blog\/2014\/05\/antivirus-is-dead\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Antivirus is Dead!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,6,17,3],"tags":[],"class_list":["post-205","post","type-post","status-publish","format-standard","hentry","category-linux","category-windoze","category-security","category-technology"],"_links":{"self":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts\/205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":8,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts\/205\/revisions"}],"predecessor-version":[{"id":213,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/posts\/205\/revisions\/213"}],"wp:attachment":[{"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/categories?post=205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.businesstechnologyassociates.com\/blog\/wp-json\/wp\/v2\/tags?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}