Darknet Diaries
134: Deviant
Deviant Ollam
Most of our jobs, we get a list of sensitive assets or sensitive areas from the client. And we say, what, you know, would accessing this asset or being in this space represent a severe breach? Would a bad actor in this space have the ability to severely compromise operations or cause severe impact? Once you have that list of assets, you formulate a series of attack chains.
0
💬
0
Comments
Log in to comment.
There are no comments yet.