SearchSecurity.com

Understanding advanced evasion techniques, preventing AET attacks

What is the best way to harden an enterprise network against advanced evasion techniques (AETs)? I see vendors coming out with software that uses this same idea to prod a network's perimeter for holes. Furthermore, what's the best way to track down the source of AETs?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement