Jason IaconoMapping Cyber Deception to the Intrusion Kill ChainLockheed Martin’s Intrusion Kill Chain Model describes seven stages that threat actors take in the course of a cyber breach, from early…Feb 26, 2019Feb 26, 2019
Jason IaconoCyber Deception — Peering Into the PastThere’s a lot of chatter and confusion about cyber deception these days: what it is, what it isn’t, and where it fits into cybersecurity…Feb 18, 2019Feb 18, 2019
Jason IaconoForecasting the World’s First Cyberwar — And What the US Can DoA full-scale war fought within the cyber domain might be “quieter”, but that doesn’t mean such a conflict would be any less deadly.Feb 13, 2019Feb 13, 2019