Return to search

Protecting Telemetry Data from Compromise Learning from the Mistakes of the Breached!

Information has value and as such any network based computer (whether that network touches
the Internet or not) has the potential to be hacked. Telemetry data is not immune to the threat.
While there are a myriad of security sensor and analytics tools available for entities to deploy in
order to protect their IT networks and assets on those networks, sometimes overlooked is also the
wealth of research data available regarding the etiology of breaches that reveal fascinating,
sometimes counterintuitive insights in the best ways to configure and integrate security
applications to protect the organization.
After reviewing the latest research data regarding computer and IT network compromise,
security strategies implied in the research data appropriate to the security challenges
encountered in the telemetry post processing environment will be thoroughly examined
providing tangible methodologies that may be employed to better protect organization telemetry
post processing and IT infrastructures.

Identiferoai:union.ndltd.org:arizona.edu/oai:arizona.openrepository.com:10150/624239
Date11 1900
CreatorsKalibjian, Jeff
ContributorsHewlett Packard Enterprise
PublisherInternational Foundation for Telemetering
Source SetsUniversity of Arizona
Languageen_US
Detected LanguageEnglish
Typetext, Proceedings
RightsCopyright © held by the author; distribution rights International Foundation for Telemetering
Relationhttp://www.telemetry.org/

Page generated in 0.002 seconds