Archaeologists have used the term defense-in-depth for decades to describe the obstacles erected to thwart attacks. Archaeologists have used the term defense-in-depth for decades to describe the obstacles erected to thwart attacks. At Dun Aengus, the most spectacular layer of defense was a band of chevaux-de-friseupturned stones jutting in every direction that made passage by horses impossible and passage by foot unlikelythat completely surrounded the middle and inner enclosures. But it’s instructive that this is just one of several kinds of defenses at the fort.Viking marauders running up a hill to take a fort would have to survive a series of defenses, arrayed in sequence: berms, ditches, outer walls, chevaux-de-frise, more ditches, walls, palisades (tall, spiky wooden fences) and more walls.Infosecurity professionals practice some defense-in-depth, but a key lesson from Dun Aengus is the variety of defenses. Today, several firewalls might equal several layers of security, but that’s only one kind of defense repeated. Bronze Age architects made sure different tools and skills would be required at every stop to slow down an attack and therefore improve the ability to counterattack. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe