-
作者Cisco
-
简介
Table of contents
- Executive summary
- Part I: The attack landscape
- The evolution of malware
- Encrypted malicious web traffic
- Email threats
- Sandbox evasion tactics
- Abuse of cloud services and
- other legitimate resources
- IoT and DDoS attacks
- Vulnerabilities and patching
- Part II: The defender landscape
- The cost of attacks
- Challenges and obstacles
- Complexity created by vendors
- in orchestration
- Impact: Public scrutiny from
- breaches, higher risk of losses
- Services: Addressing people and policies,
- as well as technology
- Expectations: Investing in
- technology and training
- Conclusion
- About Cisco
-
援引http://www.freebuf.com/articles/paper/164240.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2018-09-18 10:15:24
-
2020-04-17 10:56:49
-
2017-06-22 15:27:51
-
2019-04-29 04:58:57
附件下载
-
acr2018final.pdf