A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Want to check another podcast?
Enter the RSS feed of a podcast, and see all of their public statistics.