Thank you for your interest in our newsletters. You will receive an email shortly to confirm your subscription.
Dr David Chismon
3 mins read
Each case study provides key information from the incident, including attacker methodologies, suspected threat actors, assets compromised, business impacts and the full timeline of the attack; covering targeting, compromise, exfiltration, discovery and containment.
Case studies available for download: