Category: Business, Security, Data, firewall

Cloud Native Computing Foundation sponsored this post, in anticipation of KubeCon+CloudNativeCon North America 2021 on Oct. 11-15. You don’t have to search Netflix for these films to experience the excitement of a “good heist,” though.

Whether it’s exfiltration of data, compromise of assets or theft of resources, everything is in place for the final heist.

In the spirit of “know your enemy,” learn the tactics and techniques an attacker might use in their heist script.

Develop or acquire tools that help you to sift through the massive volumes of data to correlate signals of attack against known vulnerabilities and observed indicators of compromise.

Related Articles