SearchSecurity.com

What is the value of the Lockheed Martin cyber kill chain?

In reading the reports on the Lockheed Martin cyber kill chain framework, I was wondering what you recommend putting in place from a network perspective to stop data exfiltration versus stopping an intrusion altogether? Do you think this is a more intelligent way to protect sensitive data?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement