![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgux58LvzNCp9o6UyFlpt10TLx81TMvWN5jJKzaZirxIxQqZwT8zjnXgATreQ6zuoicwpTb7oeRhCyMNPdJmRHrTCcs0-n0zaG4yt7v4Yha3t9306heKjEUBL3gjLMSoM1qQUFrZHBogHfP/s320/TheMatrixWallpaper800.jpg)
Add to that a complementary technology - one offering more advanced features in the realm of preemptive threat detection (and perhaps "protection") and used to aid and extend blacklists - is that of clustering.
To help explain these technological terms (and whats happening in this field of preemptive technology) I wrote a couple of technical blogs that were published in SC Magazine this week. With a bit of luck you'll find them educational and a bit of fun.
Part One: Blacklists, clustering and The Matrix
Part Two: Blacklists, clustering and The Matrix
No comments:
Post a Comment