Thursday, March 27, 2014

How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks

DDos is now an insidious and easy-to-execute component of attacks that today's protective measures are often unable to detect. Learn More >>
CIO
Learn More
How DDoS Detection and Mitigation can Fight Advanced Targeted Attacks
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today's DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Learn More
Forward to a Friend >>
CIO
Additional Resources
Build The Future: The Era of the Dynamic Data Center. Learn More
3 The Hidden Cost of Data Complexity. Learn More
SUBSCRIPTION SERVICES
You are currently subscribed as garn14.tech@blogger.com
If you do not wish to receive future mailings from CIO Online Resources, unsubscribe.
View CIO's online privacy policy.
Copyright 2014 | CIO | 492 Old Connecticut Path | Framingham MA 01701 | www.cio.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.