I'm a little confused by the wording of the question. I'll need to re-read it a few times to make sure I understand all the requirements before selecting an answer.
Okay, I've got a few ideas here. I think domain specialization, depth of experience, and breadth of knowledge across the data engineering field are all important factors to consider.
Okay, let's think this through. If AMP has identified the file as malware, we need to take action to mitigate the threat. Adding it to the block list seems like the most straightforward approach, but I'm also curious about forwarding the results to an external threat-analysis engine. Might be worth considering that option as well.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
France
4 months agoWynell
4 months agoLuis
4 months agoLynda
4 months agoCandra
4 months agoJohnetta
5 months agoAndree
5 months agoMaryln
5 months agoMatt
5 months agoBrett
5 months agoWeldon
5 months agoHayley
5 months ago