When Pandas Attack How to Detect, Attribute and Respond to Malware-free Intrusions – Digitalmunition




Cryptography When Pandas Attack How to Detect, Attribute and Respond to

Published on August 29th, 2014 📆 | 8136 Views ⚑

0

When Pandas Attack How to Detect, Attribute and Respond to Malware-free Intrusions



Join Dmitri Alperovitch, Adam Meyers, and Chris Scott as they walk through how to detect, attribute, and respond to malware-free intrusions. What can you do to protect your networks when today’s advanced attackers are evading IOC-based detection? Learn how to find an attacker when there is no malware, no command and control, and file-based artifacts. Visualize a live attack from Deep Panda and then watch Falcon Host, a next-gen endpoint protection solution, detect the activity in real time.

Likes: 2

Viewed:

source

Tagged with:



Leave a Reply ✍


loading...