Cybercriminals are hastening their use of methods and malware that are intended to evade detection. In the video above, Trustwave Incident Response Consultant James Antonakos recounts his involvement in real-life breach investigations to describe how resource-deprived organizations can get started on addressing insidious, but subtle, attacks like fileless malware. One of their options, James explains, is through proactive threat hunting.
Blogs & Stories
Trustwave Blog
The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices.