A Data Science Central Community
I got hired by a budding Chinese cloud provider to find solutions to provide multi-tenancy security. In the cloud there is no perimeter to speak of, and thus the analysis needs to sift through a lot of requests to find breaches as soon as they occur. I was wondering if anyone has insights how to combine (adaptive) prevention with forensic analysis of security attacks? I am most interested in ide…
Most Popular Content on DSC
To not miss this type of content in the future, subscribe to our newsletter.
Other popular resources
Most popular articles