Government Information Security Podcast
Government Information Security Podcast
GovInfoSecurity.com
Monitoring Behavior to Flag Intrusions
1 seconds Posted Apr 28, 2015 at 5:46 am.
0:00
0:01
Download MP3
Show notes
To mitigate the threat posed by malicious insiders or attackers who compromise real users' credentials, businesses must create and monitor a baseline of legitimate user behavior and activities, says Idan Tendler, CEO of Fortscale.