Description: Changes in the threat landscape are creating huge gaps between the actual attacks we face and the abilities of our current security products to defend against them.
Its time to bridge the gap.
Many information security events are predicated or followed by measurable changes in communication patterns, their frequency or lack thereof. Some of these data sources are individually useful in the early detection of security events. Few methods have been deployed for anticipating or detecting planned events by fusing publicly available data of multiple types from multiple sources.
Tags: securitytube , hacking , hackers , information security , convention , computer security , derbycon-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.