際際滷shows by User: amralicc / http://www.slideshare.net/images/logo.gif 際際滷shows by User: amralicc / Sun, 24 Feb 2013 10:13:37 GMT 際際滷Share feed for 際際滷shows by User: amralicc SentryHQ's Reactive Security /slideshow/sentryhqs-reactive-security/16734242 sentryhqarticle-130224101337-phpapp01
Traditional Host Intrusion detection systems usually bring an attack to an operator's attention, but this asynchronous attack response paradigm may not be sufficient to stop an attack before it can do damage to a system. The solution, Amr Ali and Zach Dexter explain, is reactive security, or shutting down attacks in real-time, via collaborative attack vector closure.]]>

Traditional Host Intrusion detection systems usually bring an attack to an operator's attention, but this asynchronous attack response paradigm may not be sufficient to stop an attack before it can do damage to a system. The solution, Amr Ali and Zach Dexter explain, is reactive security, or shutting down attacks in real-time, via collaborative attack vector closure.]]>
Sun, 24 Feb 2013 10:13:37 GMT /slideshow/sentryhqs-reactive-security/16734242 amralicc@slideshare.net(amralicc) SentryHQ's Reactive Security amralicc Traditional Host Intrusion detection systems usually bring an attack to an operator's attention, but this asynchronous attack response paradigm may not be sufficient to stop an attack before it can do damage to a system. The solution, Amr Ali and Zach Dexter explain, is reactive security, or shutting down attacks in real-time, via collaborative attack vector closure. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sentryhqarticle-130224101337-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Traditional Host Intrusion detection systems usually bring an attack to an operator&#39;s attention, but this asynchronous attack response paradigm may not be sufficient to stop an attack before it can do damage to a system. The solution, Amr Ali and Zach Dexter explain, is reactive security, or shutting down attacks in real-time, via collaborative attack vector closure.
SentryHQ's Reactive Security from Amr Ali
]]>
437 4 https://cdn.slidesharecdn.com/ss_thumbnails/sentryhqarticle-130224101337-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Project Cyber Dawn: Libya /slideshow/project-cyber-dawn-libya/16189457 projectcyberdawnpublic-130126052630-phpapp01
]]>

]]>
Sat, 26 Jan 2013 05:26:30 GMT /slideshow/project-cyber-dawn-libya/16189457 amralicc@slideshare.net(amralicc) Project Cyber Dawn: Libya amralicc <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/projectcyberdawnpublic-130126052630-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Project Cyber Dawn: Libya from Amr Ali
]]>
8430 11 https://cdn.slidesharecdn.com/ss_thumbnails/projectcyberdawnpublic-130126052630-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CSFI Stuxnet Report /slideshow/csfi-stuxnet-reportv1/16189380 csfistuxnetreportv1-130126052053-phpapp02
]]>

]]>
Sat, 26 Jan 2013 05:20:53 GMT /slideshow/csfi-stuxnet-reportv1/16189380 amralicc@slideshare.net(amralicc) CSFI Stuxnet Report amralicc <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csfistuxnetreportv1-130126052053-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
CSFI Stuxnet Report from Amr Ali
]]>
988 3 https://cdn.slidesharecdn.com/ss_thumbnails/csfistuxnetreportv1-130126052053-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/sentryhqarticle-130224101337-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/sentryhqs-reactive-security/16734242 SentryHQ&#39;s Reactive Se... https://cdn.slidesharecdn.com/ss_thumbnails/projectcyberdawnpublic-130126052630-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/project-cyber-dawn-libya/16189457 Project Cyber Dawn: Libya https://cdn.slidesharecdn.com/ss_thumbnails/csfistuxnetreportv1-130126052053-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/csfi-stuxnet-reportv1/16189380 CSFI Stuxnet Report