Building an Effective Network Defense Using Threat Intelligence
Published September 6, 2016
    Download
    Add to queue
    Copy URL
    Show notes
    Based on Lockheed Martin's experience in the aftermath of a data breach, the company advises organizations to diligently gather threat intelligence internally to support development of an effective mitigation strategy, says Chris Coryea, cyber intelligence specialist.
      15
      15
        0:00:00 / 0:00:00