Posts in

Archives


“Security in depth” is one of the few expressions of cybersecurity that has remained relevant since its introduction. The idea is simple – a threat that escapes one defender will be caught by another – but implementation can be complicated. Two of the related elements of this implementation are the Intrusion Detection System (IDS) and …