Star 0

Abstract

As an industry we have become accustomed to using stale data in dealing with security events. This raises the question: With processors and networks getting faster, why are we using stale data to analyze the effects of malware and to identify its origin? This session will describe how to trace and respond to threats (current or potential) in near real time to improve overall security.