To really understand threat intelligence
, it's important to look at how organizations are attacked. One of the common models for this is to look at the entire timeline of a cyber attack
. Simplified, this attack timeline involves a run-up of reconnaissance of a target. This is a long period of increasing reconnaissance that includes probing, scanning, searching for vulnerabilities, collecting email addresses, and poking at servers. How to protect your business?