
-
作者Cisco
-
简介
Table of contents
- Executive summary
- Part I: The attack landscape
- The evolution of malware
- Encrypted malicious web traffic
- Email threats
- Sandbox evasion tactics
- Abuse of cloud services and
- other legitimate resources
- IoT and DDoS attacks
- Vulnerabilities and patching
- Part II: The defender landscape
- The cost of attacks
- Challenges and obstacles
- Complexity created by vendors
- in orchestration
- Impact: Public scrutiny from
- breaches, higher risk of losses
- Services: Addressing people and policies,
- as well as technology
- Expectations: Investing in
- technology and training
- Conclusion
- About Cisco
-
援引http://www.freebuf.com/articles/paper/164240.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2016-06-18 08:42:08
-
2016-03-15 10:03:39
-
2016-04-16 14:38:13
-
2017-03-20 16:33:46
附件下载
-
acr2018final.pdf