cyber-ir.com
Active Cyber Defence: deception and attacker control (2)
Let’s assume that until now, we have been applying active cyber defence in our environment. We are consuming intelligence, creating intelligence and working in tandem with our security operat…