From: Network World
by Jon Oltsik
Pressing need for integration, intelligence, automation, and big data capabilities
Today’s security threats are difficult to defend against. On the one hand, the volume of malware variants has gone through the roof over the past few years. On the other, targeted attacks have become more stealthy and damaging.
How can CISOs possibly combat this cybersecurity double-edged sword? With continuous monitoring of everything — IT assets, configurations, network traffic, application behavior, user activity, etc.