Being able to detect new malware infections or security breaches on a network or on a computer system without known signatures is always a challenge. We explore a simple and efficient solution to monitor external facing assets, such as servers, and we discuss the data that was collected during the experimental period.
Graham Sharples
Recent Posts
How to monitor your external devices and improve your alerts (pt.1)
Posted by
Graham Sharples on Aug 14, 2017
0 Comments Click here to read/write comments
Topics: Cyber Security Blog