Simulating Cyberattacks

Testing Intrusions Ensures the Lifecycle is Secure
Cyberattacks used as modes of distraction for fraud are organizations' biggest concern, say Pam O'Neal and Scott Register of IXIA.

But detecting the intrusion is the first step, they say. And as attacks have advanced, that detection has proven increasingly difficult. Testing intrusion detection systems ensures monitoring systems and network infrastructures are secure, says O'Neal, vice president of marketing for IXIA. And when network or system upgrades are made, security gaps can indirectly expose organizations to risk, she says.

During this interview, O'Neal and Register discuss:

  • How simulated attacks are deployed;
  • How social media sites are being used to attack organizations;
  • Why monitoring systems is critical to ensure vulnerabilities aren't inadvertently created when new software and systems are introduced into a network.

O'Neal and Register, the director of market strategy security and applications, oversee product marketing for IXIA.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.