Top IT Security Bloggers

New Requirements for Security Monitoring

Today's security threats are difficult to defend against. On the one hand, the volume of malware variants has gone through the roof over the past few years. On the other, targeted attacks have become more stealthy and damaging.
How can CISOs possibly combat this cybersecurity double-edged sword? With continuous monitoring of everything -- IT assets, configurations, network traffic, application behavior,...

Read the full article