Threat Detection Evolution: What Practitioners Need to Know
Contributed by Securosis
Prevention isn’t enough, whether you deploy it on the network or endpoints or both. It’s not clear that it ever was, but there is additional proof every day that adversaries cannot be reliably stopped. We see the beginning of the long-awaited shift of focus and funding, from prevention to detection and investigation. But security practitioners have been trying to make sense of security data for years to shorten the window between compromise and detection… largely unsuccessfully.
This document is in PDF format. To view it click here.