Head on over to the 
Verizon security blog and check out my blog on turning the VERIS and the DBIR into an attack graph: 
The Circle of Life: A DBIR Attack Graph or 
on way back machine.  And keep an eye out.  This is just the primer for the juicy stuff!
No comments:
Post a Comment