-
作者Cisco
-
简介
Table of contents
- Executive summary
- Part I: The attack landscape
- The evolution of malware
- Encrypted malicious web traffic
- Email threats
- Sandbox evasion tactics
- Abuse of cloud services and
- other legitimate resources
- IoT and DDoS attacks
- Vulnerabilities and patching
- Part II: The defender landscape
- The cost of attacks
- Challenges and obstacles
- Complexity created by vendors
- in orchestration
- Impact: Public scrutiny from
- breaches, higher risk of losses
- Services: Addressing people and policies,
- as well as technology
- Expectations: Investing in
- technology and training
- Conclusion
- About Cisco
-
援引http://www.freebuf.com/articles/paper/164240.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2020-08-27 04:00:25.560322
-
2019-08-26 06:22:55
-
2016-11-22 12:51:07
-
2018-03-10 04:03:53
附件下载
-
acr2018final.pdf