Wednesday, October 5, 2016

The Life Cycle of a Threat Pattern

Applying a structured approach to developing and maintaining significant threat patterns is absolutely key to successfully hunting for the advanced TTPs used by many motivated threat actors. In the post, Context in Risk-Based Threat Patterns, author Demetrio Milea suggested a simple and effective method borrowed from the Software Development Life Cycle (SDLC) to design and maintain threat patterns…

The post The Life Cycle of a Threat Pattern appeared first on Speaking of Security - The RSA Blog.



from The Life Cycle of a Threat Pattern

No comments:

Post a Comment