Collective Detection of Harmful Requests

Provided by: SecurityTube.net Topic: Security Date Added: May 2015 Format: Webcast
Typical signature-based methods rely on expert knowledge and the distribution of updated information to the clients, offering limited protection against newest threats. In this webcast, the presenter will aim at identifying typical and unusual behavior patterns and unusual requests.

Find By Topic