article thumbnail

BrandPost: Gain Full Visibility for Threat Detection and Response with Deep Packet Inspection

CSO Magazine

Contrary to conventional packet (or NetFlow) filters – which are devices that check only the packet headers for information regarding Internet Protocol (IP) address, source, and destination as well as port numbers — DPI examines a much larger range of metadata. The only place an attacker can’t hide is on the network.

article thumbnail

BrandPost: Resiliency in Threat Detection and Response with Machine Learning

CSO Magazine

This includes publicly shaming victim organizations and threatening to publish files to the Internet or auction off PII (personally identifiable information) to the highest bidder. Ransomware gangs, typically associated with well-established and known criminal organizations, are also evolving their tactics for extortion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

He has 15 years of cybersecurity technical product and program management experience delivering cyber solutions and developing thought leadership across multiple verticals, with a focus on threat detection, threat exposure management, response/remediation and protection. He was also director of the SANS Internet Storm Center.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat. The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD].