Defending with Graphs: Create a Graph Data Map to Visualize Pivot Paths

Preparations made during the Identify Function of the NIST Cybersecurity Framework can often pay dividends once an event response is warranted. Knowing what log data is available improves incident response readiness and providing a visual layout of those sources enables responders to pivot rapidly...
Brianne Fahey
June 26, 2019

All papers are copyrighted. No re-posting of papers is permitted