Social Media, Context and the New Face of Threat Intelligence

Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of risk, with incident response falling squarely in the ‘reactive’ camp-protective steps are taken only after an incident has…


About author View all posts Author website

David Demko

IT professional, husband, father, student of human behavior, sports and politics.