How do the threats to enterprise security differ from those posed to the individual computer user?
They’re actually connected. They go after individual computers. You’re familiar with the botnet piece of it, where individual computers become a network of a 100,000 or so where you have massive computing power. The botnets are used primarily for mass distribution of spam and malware, and sometimes DDOS [distributed denial-of-service] attacks. A credit card number could be picked up along the way, since the computer is captured and many of us have financial programs on our PCs. But most of the credit card and Social Security numbers come from large breaches from institutional sources. That is when bundling of card packages occurs and profiting begins. These are generally the work of organized professionals. The concern has been that security is an afterthought. How do you get IT leaders to stop tacking on security at the end of the software development life cycle and instead consider it from the start? We need to talk to developers at the very beginning of the conception stage. Right n