Published on August 29th, 2014 📆 | 8136 Views ⚑0
When Pandas Attack How to Detect, Attribute and Respond to Malware-free Intrusions
Join Dmitri Alperovitch, Adam Meyers, and Chris Scott as they walk through how to detect, attribute, and respond to malware-free intrusions. What can you do to protect your networks when today’s advanced attackers are evading IOC-based detection? Learn how to find an attacker when there is no malware, no command and control, and file-based artifacts. Visualize a live attack from Deep Panda and then watch Falcon Host, a next-gen endpoint protection solution, detect the activity in real time.