Amy Hodler outlines suggestions on how your security team can calculate exposure and protect against cyber attacks
When we look at reining in and limiting nefarious activity on organisational networks, it helps to think like a criminal. Criminals look for vulnerabilities. They think in ‘graphs,’ while the organisations they target usually think in lists, combating crime through elimination. Graphs are a way of representing reality in terms of nodes and the connections or relationships between them. Cybercriminals are looking for undetected relationships to exploit. It is these weaknesses that are inherent vulnerabilities. They . . .