Tracking Ghosts through the Fog

  • Tuesday, April 21, 2015 | 2:20 PM – 3:10 PM | North | Room: 132

View all Sessions

Digital footprints have always been hard to follow. Now it feels more like tracking ghosts in the fog. Attackers are using a number of creative new tactics to bypass typical defenses. The ghosts are using the Cloud, encryption, short-lived sites, and the Internet of Things to do their devious deeds. We’ll discuss what does and doesn’t work in clearing the fog.


This document was retrieved from on Sat, 22 Oct 2016 03:09:22 -0400.
© 2016 EMC Corporation. All rights reserved.