Here's the scenario. An intruder has been lingering in your network for eight months. Since first gaining a foothold by compromising the HR Director's computer, the intruder has been able to quietly scope out the network and now has an excellent picture of the servers, data stores, cloud data centers, users, networking equipment and IP-enabled...The post Security Assurance: The Power of Knowing appeared first on LightCyber.