By
Todd Weller
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
Once a threat has been identified in the system and verified as not a false positive, a cross-functional team is needed to oversee response, which includes locating "patient zero," the original point of entry or infection, and gaining access to the actual malware or threat. The team will need the skills to analyze it and determine how it got in, how it's behaving and spreading, and whether data is being exfiltrated.
0 Comments
View Comments
- Places:
- U.S.
Todd Weller
Author's page
Related Content
Comments