Mark Oakey’s Post

View profile for Mark Oakey, graphic

Federal Government and Defence Lead

Vulnerabilities and exposure, whether due to insecurity-by-design or to organisations failing to configure devices securely, are practically an inevitability. Advanced threat actors, through stealth and their ability to live off the land without detection to conduct their attacks. With these types of techniques difficult to detect because they appear similar to the benign activity associated with false positives, making them less likely to be investigated. One of the topics touched on yesterday at the Australian Security Summit (AusSec) covered secure supply chains which is key, but challenging to scale, so for broader application of steps around prevention and detection all begins with deep visibility - continuously and real-time. Daniel Trivellato, Forescout VP OT and IoMT Solutions shares his insights in this latest article via Smart Industry from Endeavor Business Media: https://lnkd.in/gcb3wabS . #forescout #otsecurity #iotsecurity #networksecurity #networkvisibility

Ghosts in the network: How attackers remain unseen | Smart Industry

Ghosts in the network: How attackers remain unseen | Smart Industry

smartindustry.com

To view or add a comment, sign in

Explore topics