After threat modelling, consider reading The Diamond Model of Intrusion Analysis to assist in operational incident and control measures, especially to catch APTs.
this post was submitted on 26 Dec 2024
10 points (100.0% liked)
Cyber Security
65 readers
2 users here now
๐ต๐ฟ Surveillance, Information security, Cybersecurity, Interoperability, Analytics, Data tracking, Digital Disinformation, Decentralised Finance, Algorithmic Sovereignty & Privacy By Design.
Questions and answers are encouraged. Be excellent to each other. ๐๏ธ
founded 7 months ago
MODERATORS