Why Model and Detect Late Stage Attacks

Download this episode

Download Video

Description

Think of an attack path (or kill chain) as one of those kids toys where you rotate animals. Heads, bodies, tails. Intrusions, compromises, exfiltrations. Which part is easiest to detect and why?

Tag:

Security

Embed

Format

Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.