Thursday, May 7, 2015

The Circle of Life: A DBIR Attack Graph

Head on over to the Verizon security blog and check out my blog on turning the VERIS and the DBIR into an attack graph: The Circle of Life: A DBIR Attack Graph or on way back machine.  And keep an eye out.  This is just the primer for the juicy stuff!

No comments:

Post a Comment