FRAW site index
Free Range Library index

Free Range Library
categories:

Anarchism & Action

Climate Change

Croughtonwatch

Cyberwar

Direct Action & Protest

Economics

Energy

Electrosmog

Extreme Energy

Extr. Energy Climate

Extr. Energy Economics

Extr. Energy Nature

Extr. Energy Pollution

Extr. Energy Radiation

Food & Agriculture

FOSS & Linux

Hacktivism

Land Rights

'Limits to Growth'

Neo-Luddism

Nuclear

Peace

Peak Oil

Planning System

Politics

Simplicity

Technology

Toxics

Transport

UCG

UK Government

UK Parliament

Vegans/Vegetarians

Waste

50 most recently added files index

Free Range Library indexes last updated 15:41, 28/06/2018

This form allows you to search the resource IDs and resource titles of the files in the Free Range Library. If a full match to a key cannot be found, a list of partial matches is returned.

library logo

The Free Range Virtual Library:

Cybersecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model

FireEye/Mandiant, May 2014


Free Range Library News & Events

10/04/18: Library database engine updated.

28/08/17: Library database engine updated (FRAW Library should be listed on searches more easily now).

10/08/17: Further changes to the website architecture completed to allowed continued expansion of the library.

22/12/16: 14 papers have been added to the Extreme Energy, Climate Change and UK Government sections.

22/11/16: 60 papers have been added to the Extreme Energy section.

back to previous page

Resource information:
Resource IDfireeye2014
Resource titleCybersecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model
Author/sourceFireEye/Mandiant
Date publishedMay 2014
Summary text/ abstractIt doesn't matter what types of firewall, intrusion prevention system (IPS), Web gateway, sandbox and endpoint systems make up organizations' Maginot Line; attackers are circumventing them all. As this report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures alone. Security teams must be able to see the alerts that matter. And they must complement those with rapid endpoint response expertise to confirm and contain attacks as soon as they appear.
Library categoriesFOSS & Linux, Hacktivism
Added to Free Range Library04/09/2014
Download file(s):

file iconCybersecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model [1.8 megabytes]


back to previous page

[an error occurred while processing this directive]