Browse by Tags

Tagged Content List
  • Blog Post: The Case of the Unexplained FTP Connections

    A key part of any cybersecurity plan is “continuous monitoring”, or enabling auditing and monitoring throughout a network environment and configuring automated analysis of the resulting logs to identify anomalous behaviors that merit investigation. This is part of the new “assumed breach” mentality that...