Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains

Download Now

Overview:

This white paper discusses the use of "kill chains" in the analysis of these threats and the use of the resulting data for system protection.

There's More to This Story

Get more. You can read the rest of this story and other exclusive content as a Plant Services member. It's FREE, and it’s easy. We just need your name and email address. Then you can read everything you want on our site and even comment on it.

Join the discussion

We welcome your thoughtful comments. Please comply with our Community rules.
All comments will display your user name.

Want to participate in the discussion?

Register for free

Log in for complete access.

Comments

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments