How to Spot Invisible Incidents

Want to visit   +26

Author: Dmitry Kuznetsov

Statistics show that attackers require three to five days to obtain full control over large IT infrastructures. While intruders may operate in a hacked network for months, companies usually become acknowledged once hackers' actions lead to significant financial loss.

Standard protection means are of no help. Hiring hackers to prevent hypothetical incidents is unreal. How then to detect intruders in your network?

  • Language
  • Russian

Dmitry Kuznetsov is the Director of Methodology and Standardization at Positive Technologies. He manages scientific researches in product development and certification. He also represents the company in the technical committees of the Federal Agency on Technical Regulating and Metrology — “Information Security” and “Standards for Financial Operations”.

Dmitry Kuznetsov Dmitry Kuznetsov

Back to the list