Device Trajectory

September 26, 2017

SECURITY

Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints

3 min read

You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shattered window […]