-
作者Cisco
-
简介
Table of contents
- Executive summary
- Part I: The attack landscape
- The evolution of malware
- Encrypted malicious web traffic
- Email threats
- Sandbox evasion tactics
- Abuse of cloud services and
- other legitimate resources
- IoT and DDoS attacks
- Vulnerabilities and patching
- Part II: The defender landscape
- The cost of attacks
- Challenges and obstacles
- Complexity created by vendors
- in orchestration
- Impact: Public scrutiny from
- breaches, higher risk of losses
- Services: Addressing people and policies,
- as well as technology
- Expectations: Investing in
- technology and training
- Conclusion
- About Cisco
-
援引http://www.freebuf.com/articles/paper/164240.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2018-12-20 09:02:28
-
2023-04-29 16:34:52.851333
-
2018-05-09 12:20:51
-
2017-07-28 02:17:20
附件下载
-
acr2018final.pdf