In an era when businesses are scrambling to defend against sophisticated advanced persistent threats (APTs), signature-based antivirus may seem like a relic.
By John Breeden II |
12 May |
Read more
The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.
By John Breeden II |
08 Dec |
Read more
Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a network from active threats as they happen, in addition to detecting every possible vulnerability that could be exploited by an attacker.
By John Breeden II |
11 Aug |
Read more