acm-header
Sign In

Communications of the ACM

ACM Careers

Getting a Clear Picture of a Computer Network's Security


View as: Print Mobile App Share:
Suspicious network activity

Vectra' tool screenshot offering a comprehensive look at all suspicious activity on a customer's network over a week.

Credit: Vectra Networks, Inc.

Security experts say the only hope of protecting corporate networks from hackers is something the industry calls "defense in depth."

From The New York Times
View Full Article

 


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account