After threat modelling, consider reading The Diamond Model of Intrusion Analysis to assist in operational incident and control measures, especially to catch APTs.
this post was submitted on 26 Dec 2024
9 points (100.0% liked)
Cyber Security
121 readers
7 users here now
๐ต๐ฟ Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.
Questions and answers are encouraged. Be excellent to each other. ๐๏ธ
founded 1 year ago
MODERATORS