How cyberattackers evade threat signatures [telecom]

How cyberattackers evade threat signatures - The case for behaviour-based threat detection MORE NEWS

By Mark Bowen

Nimble attackers can easily create and hide their exploits in an infinite number of ways. Ammar Enaya, Regional Director - Middle East, Turkey and North Africa at Vectra, says: "The limitations of signatures should be complemented with automated threat management models that continuously learn new attack behaviours and adapt to network changes."

formatting link

Reply to
Loading thread data ... Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.