The Steps of a Cybersecurity Kill Chain: How to Identify and Defend Against It
A kill chain consists of seven identifiable steps (as defined by Lockheed Martin) which cyber criminals go through in order to gain access to an organization, typically by compromising a legitimate user. These steps are followed in order to extract useful data from a victim or their organization.
It’s important to understand how the kill chain works because timing is everything — for both the good guys and the bad guys. According to Humphrey Christian, VP of product management at cyber risk management provider Bay Dynamics, the earlier a company can detect
The kill chain steps are as follows:… Read more