Search
Homepage This page's url is: -crn- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Intel Partner Connect Digital Newsroom Dell Technologies World Newsroom Dell Technologies Newsroom HP Reinvent 2020 Newsroom IBM Newsroom The IoT Integrator Lenovo Newsroom NetApp Data Fabric Intel Tech Provider Zone

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 what they see as the top oft-repeated beliefs about cybersecurity that are foolishly accepted as fact.

Back 1 ... 6   7   8   9   10   ... 13 Next
photo

Endpoint Detection And Response Is Difficult

Analyst reports from organizations like Gartner and Forrester often claim that customers need a high degree of expertise to use an endpoint detection and response product, according to Dan Larson, CrowdStrike's vice president of product marketing.

This perception exists due to poorly implemented EDR tools that only collect data and then ask customers to find threats in the data by feeding in indicators of compromise or building hunts for scheduled data types, Larson said. If the burden is on the customer to find the data, Larson acknowledged it's going to be hard.

Good EDR products, though, will know how to automatically find threats in a data set by analyzing data and automating the detection and prevention of threats, according to Larson. "EDR doesn't have to be a science experiment," Larson said.

 
 
Back 1 ... 6   7   8   9   10   ... 13 Next

sponsored resources