Head on over to the
Verizon security blog and check out my blog on turning the VERIS and the DBIR into an attack graph:
The Circle of Life: A DBIR Attack Graph or
on way back machine. And keep an eye out. This is just the primer for the juicy stuff!
No comments:
Post a Comment