One Step Ahead of Advanced Attacks and Malware

  • Wednesday, February 26, 2014 | 9:20 AM – 10:20 AM | North | Room: 132

View all Sessions

Signature-based approaches offer excellent precision and efficiency, but lack the depth needed to protect against advanced malware and stealthy attacks. On the other hand, alternatives are out-of-band, time consuming and disjointed, making them interesting on paper but not as effective in practice. Come and learn about innovative techniques that marry both sides in a practical manner today.


This document was retrieved from on Thu, 20 Jun 2019 17:36:41 -0400.