CSIRT, I have a project for you. We have a big network and we’re definitely getting hacked constantly. Your group [...]
via Cisco Blog » Security http://blogs.cisco.com/security/using-a-playbook-model-to-organize-your-information-security-monitoring-strategy/
via Cisco Blog » Security http://blogs.cisco.com/security/using-a-playbook-model-to-organize-your-information-security-monitoring-strategy/
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.