eBooks

Indications of Compromise Part 2: The Roles of Antivirus and Patch Management

In part one of our Indications of Compromise series, we discussed the Lockheed Martin Cyber Kill Chain® framework, which breaks down the phases of malware exploitation. Once you understand the full life cycle, it’s time to get into the nitty-gritty of cyberdefenses. For this eBook, we’ll focus on the initial endpoint attack vector “exploitation,” assuming the delivery phase of the exploit has been successfully executed against the target endpoint. 

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to access this resource.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site