New, stealthy threats change best responses to cyberattack

With advanced persistent threats, trying to ID the source can be 'futile,' so focus on minimizing the damage, a revision of NIST's guidelines for incident response says.
This entry was posted in Technology. Bookmark the permalink.

Comments are closed.