RSS feed Get our RSS feed

News by Topic

The Threat Lifecycle Management Framework

Logrhythm

The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defences with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.

Tags : reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
 Email this page
Published:  Sep 05, 2017
Length:  11
Type:  White Paper