Intrusion detection and the “kill chain”

Posted on July 31, 2012