Tracking Ghosts through the Fog
Digital footprints have always been hard to follow. Now it feels more like tracking ghosts in the fog. Attackers are using a number of creative new tactics to bypass typical defenses. The ghosts are using the Cloud, encryption, short-lived sites, and the Internet of Things to do their devious deeds. We’ll discuss what does and doesn’t work in clearing the fog.