Page 43 - index
P. 43
manner – thus resulting in the data breach. The breach at Target left the security industry with a
major problem to consider: how can we help to detect a truly stealthy adversary? How do we
detect any one of the new 200,000 variants of malware? The answer here lies in the speed of
detection.
The concept of continuous detection and response, coupled with a stable incident response
strategy and automated malware removal serves as a protective trifecta to combat against data
breaches, cyber-attacks and APTs of all sizes. With all of these tools in place though,
organizations must still find ways to continuously monitor their environment – automation is one
strategy that can help. With all of that being said, at the end of the day, what kind of
organization do YOU want to be a part of? The haves or the have-nots?
About the Author
Todd Weller, VP, Corporate Development, joined Hexis Cyber
Solutions in March 2014. His responsibilities include analyst relations,
competitive and market intelligence, corporate visibility, M&A, and
strategic partnership development. Todd draws on his 17+ years of
experience as an equity research analyst where he covered the
security industry for much of that time. In his equity research career
Todd provided research coverage of over 60 companies across
several technology sectors, including security, infrastructure software,
data center/cloud hosting, and healthcare IT.
Connect with Hexis online: http://www.hexiscyber.com/
Hexis Blog: http://www.hexiscyber.com/blog
Twitter: @hexis_cyber
LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions
43 Cyber Warnings E-Magazine – January 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide