Monday, 27 March 2017

Catching the bad guys via threat hunting

Greetings Colleague,
 
Have you ever suspected that your network was undergoing an attack? IDG wants to hear about how your organization is approaching the idea of threat hunting.
 
To participate in our short survey, please click the link below or copy and paste it into your browser.
 
 
Your thoughts are important- thank you!
 
 
 
 
The survey is confidential; neither your name nor your company's name will be associated with your answers.  If you have any questions about this survey, you may contact our sister company IDG Research at surveys@idgresearch.com.
 

SUBSCRIPTION SERVICES
You are currently subscribed as independentonlinenewsreporter@gmail.com. To unsubscribe, please visit: http://optouts.computerworld.com/index.html?dept_id=38&emid=90b0a396fd95116fe97a47117477ff5d

When accessing content promoted here, you are providing consent for your information to be shared with the sponsors of the content.  Please see our privacy policy for more informaion.

Copyright 2015 | Computerworld Inc. | 492 Old Connecticut Path | Framingham MA 01701 | www.computerworld.com 

No comments:

Post a Comment