May 7, 2015 by
The Circle of Life: A DBIR Attack Graph
This was originally posted on blogger here.
Head on over to the Verizon security blog and check out my blog on turning the VERIS and the DBIR into an attack graph: The Circle of Life: A DBIR Attack Graph or on way back machine. And keep an eye out. This is just the primer for the juicy stuff!