3.3 Security in the field

Security in the field

Security information and event management explained (4:23)

 

Internet threat security landscape (26:20)

 

Reflect

  • What are some of the big shifts in the security landscape of the last 20 years?
  • What are typical threats and attackers today?
  • What are changes since 2015 that the video does not address?