Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

No Malware, No Compromise

  • Broadcast in Technology
Federal Technology Insider

Federal Technology Insider

×  

Follow This Show

If you liked this show, you should follow Federal Technology Insider.
h:427957
s:5007245
archived

While conducting incident response work, Mandiant encounters security teams and executives who seem to focus on malware as the defining feature of a compromise. These groups think that the scope of an incident depends on knowing where the intruder installed malware. Knowing where malware was used, and how it was used, is indeed important for effective incident response. Unfortunately, knowledge of malware, however complete, is only half the picture.

Facebook comments

Available when logged-in to Facebook and if Targeting Cookies are enabled