-
作者Cisco
-
简介
Table of contents
- Executive summary
- Part I: The attack landscape
- The evolution of malware
- Encrypted malicious web traffic
- Email threats
- Sandbox evasion tactics
- Abuse of cloud services and
- other legitimate resources
- IoT and DDoS attacks
- Vulnerabilities and patching
- Part II: The defender landscape
- The cost of attacks
- Challenges and obstacles
- Complexity created by vendors
- in orchestration
- Impact: Public scrutiny from
- breaches, higher risk of losses
- Services: Addressing people and policies,
- as well as technology
- Expectations: Investing in
- technology and training
- Conclusion
- About Cisco
-
援引http://www.freebuf.com/articles/paper/164240.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2023-10-16 14:24:29.816429
-
2017-11-10 15:42:27
-
2017-09-04 09:56:47
-
2016-03-15 07:25:17
附件下载
-
acr2018final.pdf