Penetration testers as well as bad-guy hackers typically rely on several common attack tools to break into business networks. Enterprises defending their networks can flip the equation on attackers by using active intrusion detection strategies to create situations where attackers overly reliant on these tools inadvertently expose themselves to detection and other complications, says John Ventura, practice manager for applied research at Optiv.
Read full news article on dark READING