By neglecting the bottom 10%, we are overlooking some of the biggest sources of actionable intelligence on our networks
It costs three times more to clean up an incident than to prevent one
Vulnerability scanners and malware scanners each have their own intrinsic strengths and weaknesses
by Ken Bechtel on July 10, 2015
Without experience and knowledge, the response team will not know which alerts to respond to
by Ken Bechtel on November 25, 2014
by Ken Bechtel on August 28, 2014
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.