Abstract

Most organisations of any appreciable size are now equipped with layers of information security, including firewalls, intrusion detection and prevention systems, file integrity monitoring and security incident and event management. These systems log massive amounts of data about network activity and frequently raise alarms. So why do breaches still happen? We spoke with Mark Kedgley, CTO of New Net Technologies. Most organisations of any appreciable size are now equipped with layers of information security that log massive amounts of data about network activity and frequently raise alarms. This means network intrusions are often lost in the noise. Perhaps we need to get smarter about how we manage alerts. In this interview, Mark Kedgley of New Net Technologies talks about ‘closed-loop intelligent control’, based on file integrity monitoring, that can help to tune out the noise and make it easier to spot the threats.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.