Monthly Archives: April 2012

What do you depend on for detection?

Protect, detect, respond, recover.   Under assumption of  breach, we assume protections will fail and we must rely on deployed detection technologies to notify network operators of malicious activity.   Today’s primary detection technologies, network intrusion detection systems and host-based … Continue reading

Posted in Uncategorized | Comments Off