The Case of the Unexplained FTP Connections

A key part of any cybersecurity plan is “continuous monitoring”, or enabling auditing and monitoring throughout a network environment and configuring automated analysis of the resulting logs to identify anomalous behaviors that merit investigation. This...(read more)
 •  0 comments  •  flag
Share on Twitter
Published on October 30, 2012 07:00
No comments have been added yet.


Mark E. Russinovich's Blog

Mark E. Russinovich
Mark E. Russinovich isn't a Goodreads Author (yet), but they do have a blog, so here are some recent posts imported from their feed.
Follow Mark E. Russinovich's blog with rss.