Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis

Thwarting the Insider Threat with Network Traffic Analysis

For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) c… Continue reading Thwarting the Insider Threat with Network Traffic Analysis