Trusted Networking?
from the it's-a-step... dept
Last week we wrote about how the idea of comply and connect security was beginning to get more attention than the traditional “scan and block” method, which has been shown to be too reactive. At the time, we suggested a hybrid approach would make more sense. Furthering this point, the unfortunately named Trusted Computing Group is working on a standard for establishing security policies for a “comply and connect” system. This way, anyone can set the rules and they can be used across different vendors. The companies involved are all quite impressive, but it does seem like they’re all heavily invested in this area already – meaning that the solution is likely to have compromises and be more focused on protecting business models than actually solving some of the bigger issues concerning stopping malicious attacks and files.