How cyberattackers evade threat signatures - The case for behaviour-based threat detection MORE NEWS
By Mark Bowen
Nimble attackers can easily create and hide their exploits in an infinite number of ways. Ammar Enaya, Regional Director - Middle East, Turkey and North Africa at Vectra, says: "The limitations of signatures should be complemented with automated threat management models that continuously learn new attack behaviours and adapt to network changes."
formatting link