July 22, 2014 - Source: TechRepublic
Use free tools for blog monitoring and warding off vector attacks
By Frank Ohlhorst
"Moving from reactive to proactive ideologies takes a lot of work on the behalf of security administrators, which comes in the form of understanding what normal network flow looks like, as well as normal application use - not an easy task by any measure. [...]"