Q&A: Accedian’s Michael Rezek on using ‘Network Traffic Analysis’ to defend hybrid networks

CERT-LatestNews ThreatsActivists ThreatsCybercrime
And applications, themselves, are being delivered in a complex, multi-tier fashion. So I may have a frontend web-tier server in one location, a backend database server in another location and application-tier server in yet another location, all hitting DNS servers. So you now have all of these new attack vectors emerging, as well.