Cryptography

Published on August 29th, 2014 📆 | 6251 Views ⚑

0

When Pandas Attack How to Detect, Attribute and Respond to Malware-free Intrusions


uk text to speech



Join Dmitri Alperovitch, Adam Meyers, and Chris Scott as they walk through how to detect, attribute, and respond to malware-free intrusions. What can you do to protect your networks when today’s advanced attackers are evading IOC-based detection? Learn how to find an attacker when there is no malware, no command and control, and file-based artifacts. Visualize a live attack from Deep Panda and then watch Falcon Host, a next-gen endpoint protection solution, detect the activity in real time.

Likes: 2

Viewed:

source





Tagged with:



Comments are closed.