A Data Science Central Community
I got hired by a budding Chinese cloud provider to find solutions to provide multi-tenancy security. In the cloud there is no perimeter to speak of, and thus the analysis needs to sift through a lot of requests to find breaches as soon as they occur. I was wondering if anyone has insights how to combine (adaptive) prevention with forensic analysis of security attacks? I am most interested in ide…
© 2021 TechTarget, Inc.
Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service
Most Popular Content on DSC
To not miss this type of content in the future, subscribe to our newsletter.
Other popular resources
Archives: 2008-2014 | 2015-2016 | 2017-2019 | Book 1 | Book 2 | More
Most popular articles