seems to me that a good IPS system should detect and block this method, or
am I way off base ?

On Sat, Oct 17, 2015 at 9:53 PM, Andrew S. Baker <[email protected]> wrote:

> Most SMBs?   Larger orgs will be equally at a loss.
>
> The key in this case is to prevent or quickly detect the initial
> breach/compromise, because once a machine on the inside is compromised,
> preventing it from spreading will be much, much harder.
>
>
>
>
>
>
> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
> *Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…*
>
> * GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A
>
>
> On Fri, Oct 16, 2015 at 10:59 PM, Richard Stovall <[email protected]>
> wrote:
>
>> I had not heard of this before.
>>
>> https://zeltser.com/c2-dns-tunneling/
>>
>> How in the world can most SMBs ever begin to beat back this kind of stuff?
>>
>
>

Reply via email to