Day Zero Is How Long??!
Charles Herring
18 October 2012
We are taking a retarded amount of time to discover unknown (zero day) threats and how we can reduce that window.
Threat data contained in Indicators of Compromise (IOC) can be applied against the data stored in StealthWatch to look for markers of historical breach. This entry outlines the steps in performing this analysis.
With Microsoft discontinuing support of Windows XP, organizations need guidance on how to protect the legacy machines they can't replace.
We are taking a retarded amount of time to discover unknown (zero day) threats and how we can reduce that window.