Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - How Lockheed Martin's 'Kill Chain' Stopped An Attacker Already Inside->

Submitted by ancientribe
ancientribe (1057834) writes "Lockheed Martin's director of cybersecurity provided a rare inside look at how the Defense contractor was able to stop sophisticated attackers who had gotten inside its network from actually stealing anything. Lockheed's multi-million dollar Cyber Kill Chain framework, a combination of security intelligence tools and manpower was built to prevent determined attackers who inevitably gain a foothold in the network from taking anything with them. This Dark Reading article highlights an incident where an attacker posed as one of Lockheed's business partners, using legitimate credentials and a stolen RSA SecurID token."
Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

How Lockheed Martin's 'Kill Chain' Stopped An Attacker Already Inside

Comments Filter:

According to the latest official figures, 43% of all statistics are totally worthless.

Working...