Source |
CSO |
Identifiant |
1450414 |
Date de publication |
2019-11-04 12:31:00 (vue: 2019-11-07 00:00:20) |
Titre |
BrandPost: How to Implement Policies to Secure Your Network |
Texte |
Certain security basics used to be good enough to protect your network. You could roll out an endpoint security tool, implement a firewall, and use sandboxing, and at least sleep a little easier at night. But today's attackers are more sophisticated, and that means security professionals have to be more sophisticated, too.A key part of that is configuring policies that are specific to your network and match the behavior you expect to see. This makes it easier to surface anomalous communications that could indicate a breach. Since attackers often won't know about how your network is structured, these policies could block or surface an attack in progress, or make it harder for an attacker to pivot laterally within your organization. |
Envoyé |
Oui |
Condensat |
about anomalous are article attack attacker attackers basics behavior block brandpost: breach but certain click communications configuring could easier endpoint enough expect firewall full good harder have here how implement indicate key know laterally least little make makes match means more network night often organization out part pivot please policies professionals progress protect read roll sandboxing secure security see since sleep sophisticated specific structured surface these today too tool use used within won your |
Tags |
|
Stories |
|
Notes |
|
Move |
|