John Strand // This is the second part of our series about Attack Tactics. In the first part we discussed how we’d attack. Now, we cover the same attack, but this time we are covering the defensive components the organization could have implemented to stop us every step of the way. We cover event logs, […]
The post WEBCAST: Attack Tactics Part 2 appeared first on Black Hills Information Security.
Article Link: https://www.blackhillsinfosec.com/webcast-attack-tactics-part-2/