The History of Intrusion Detection Systems (IDS) – Part 1

Great applied technology typically needs enabling partner technology, and it will struggle to make headway until that partner appears. For decades, Intrusion Detection System (IDS) technology struggled to deliver efficient, high quality intrusion monitoring, and is only now experiencing success with the arrival of an unintentional enabling partner technology – cloud computing.

Read more “The History of Intrusion Detection Systems (IDS) – Part 1”