Life Beyond Blocking: Adopting Behavior-Based CybersecurityForcepoint's Carl Leonard Says More Real-Time Response to Behavior Required
To arrest incoming malware, users browsing to bad sites or phishing attack attempts, among other threats, many cybersecurity tools are designed to block or allow specific activities based on prescribed rules, says Carl Leonard of Forcepoint.
See Also: Top 50 Security Threats
But with insider breaches continuing regardless, Leonard says there's a need for a more risk-adaptive approach to enterprise protection and to respond to user behavior by adjusting security policies in real time.
In a video interview at the recent Infosecurity Europe conference, Leonard discusses:
- The pursuit of risk-based security over a more threat-centric approach;
- How to achieve more adaptive protection;
- Mitigating the insider risk.
Leonard, principal security analyst at Forcepoint, helps direct the company's global security lab research efforts and advises business leaders on solving the challenges posed by the threat landscape. He's been a a featured speaker at numerous conferences, including RSA, Infosecurity Europe and eCrime.