| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Traditional malware defenses have a detection gap between a new piece of malware and the deployment of updates to signature based solutions. Large organizations have advanced tools and resources to combat the problem but, small and medium sized organizations need a method to prevent, detect, and remediate issues until help arrives. This presentation is the logical next step from 2013’s Identifying Evil and 2012’s Hunting Evil presentations.Key topics covered will examine tools and techniques that will help your organization survive the critical hours immediately after an incident.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast