Why the ‘cyber kill chain’ needs an upgrade
“One of the most popular models for analyzing cyberattacks doesn’t focus enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las Vegas.
IT resume makeover: Don’t try to please everyone
Writing a resume means knowing your audience. If you try to please everyone, you’ll only wind up with
‘Every attacker will become an insider if they are persistent enough,’ says Sean Malone, a security consultant who spoke at the conference. ‘We need to operate under a presumption of breach.’”