Author Topic: SS8’s time machine is designed to automate the hunt for compromises    (Read 20 times)

0 Members and 1 Guest are viewing this topic.

Offline Scarlett

  • Updates Moderator
  • *
  • Posts: 22996
SS8’s time machine is designed to automate the hunt for compromises  
« Reply #1 on: March 30, 2017, 09:23:44 PM »
SS8’s time machine is designed to automate the hunt for compromises  
30 March 2017, 7:59 pm



This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  

When it comes to enterprise security, it has long been established that prevention, though critical, is not enough. Prevention largely depends on knowing what is bad and priming security devices like firewalls and intrusion prevention systems with the rules necessary to keep bad stuff out. The problem is, something can be bad but nobody knows it yet, so there’s no rule to put in the firewall. An attacker’s damage can be done long before the rule is created.

To read this article in full or to leave a comment, please click here



Source: Network World Security

>> To obtain the full NetworkWorld Security article, click the link in the first post line <<

 


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2018 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by DSTM & PseFrank

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques



Smokey's also provides free fully qualified Log / Malware Analysis & Removal Help and System Health Checks