Jun 25, 2018, 17:09 PM
by
Stephen Cobb
Imagine you’re working in the IT security department and you’re just about to take your lunch when someone in accounting calls to say their computer is “acting strange.” Lunch will have to wait. But in a way, you’re also lucky because not all attacks raise red flags. That is where endpoint detection and response comes into play.
Full story