Government Information Security Podcast
GovInfoSecurity.com
Add to My Podcasts
Episodes
About
Reviews
Charts
Promote
Monitoring Behavior to Flag Intrusions
1 seconds
Posted Apr 28, 2015 at 5:46 am.
0:00
0:01
Add to My Queue
Download
MP3
Share
episode
Share at current time
Show notes
To mitigate the threat posed by malicious insiders or attackers who compromise real users' credentials, businesses must create and monitor a baseline of legitimate user behavior and activities, says Idan Tendler, CEO of Fortscale.
Previous
Threat Intelligence Versus Threat Data
Next
Threat Intelligence: Standards Required
← See all 3142 episodes of Government Information Security Podcast
Privacy Manager