Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Emerging cyberthreats exploit battle between compliance and security


March 5, 2015 02:00 PM

While regulatory compliance is valuable and necessary for enterprises, cyberthreat experts say a compliance-centric security strategy may leave organizations with few resources to ward off emerging cyberthreats.

Regulatory compliance is a necessity for nearly all organizations, but security industry experts say enterprise security programs consumed by compliance may risk falling behind the fast-paced world of cyberthreats.

Wednesday during a panel discussion at the 2015 SecureWorld Boston conference, a number of vendors spoke about the state of emerging threats, including "typosquatting" URLs taking users to malware-laden websites, domain shadowing, shadow IT and mobile malware. Yet all the panelists emphasized how regulatory compliance may have a negative effect on security, specifically in terms of how quickly security can adapt to threats.

Thomas Bain, vice president of marketing and security strategy for Waltham, Mass.-based security vendor CounterTack Inc., noted that regulatory compliance can serve as a mechanism to augment an information security budget, but that compliance processes should be seen as a solid foundation for a security program rather than an answer to all of an organization's security concerns.

"Compliance is a good way to get a security product into a budget," said Bain, "but compliance mandates don't tend to be prescriptive; it's more about having a framework."

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia