From the Spring 2014 Issue
Protecting Your Data
Near-Term Vision of IT Security Threat Monitors
Author(s):
Benjamin Shelton, , Nangwik Services
Don Tobin, ,
Continuously updating, learning and optimizing in an ever-changing “threatscape” As most information security professionals are aware, breaches go from initial point of entry to data extraction in a matter of hours or seconds, yet their detection, analysis, and remediation is usually measured in weeks. New techniques and approaches are needed to shrink this time difference. There … Read more