File Trajectory

September 26, 2017

SECURITY

Uncover the Where, When, and How of an Attack with “Trajectory” from Cisco AMP for Endpoints

You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shatte…