Page 28 - index
P. 28
Continuous monitoring is needed to combat advanced persistent threats
TechCrunch expects that advanced persistent threats will surge over the next year, and that
means cybersecurity tools that can detect malicious code in the network will prevent hackers
from making their stay in a network an extended one.
As organizations everywhere are starting to learn, keeping tabs on what goes through their
networks is a full-time job. Given the regularity with which hackers slip through perimeter
defenses and engage in advanced persistent attacks, continuous monitoring provides an extra
layer of security that stays vigilant even when preventative measures fail.
About the Author
Todd Weller, VP, Corporate Development, joined Hexis Cyber
Solutions in March 2014. His responsibilities include analyst relations,
competitive and market intelligence, corporate visibility, M&A, and
strategic partnership development. Todd draws on his 17+ years of
experience as an equity research analyst where he covered the
security industry for much of that time. In his equity research career
Todd provided research coverage of over 60 companies across
several technology sectors, including security, infrastructure software,
data center/cloud hosting, and healthcare IT.
Connect with Hexis online: http://www.hexiscyber.com/
Hexis Blog: http://www.hexiscyber.com/blog
Twitter: @hexis_cyber
LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions
28 Cyber Warnings E-Magazine – January 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide