Get the latest tech news
Defenders think in lists, attackers think in graphs (2015)
Shared Blogs and Notebooks. Contribute to JohnLaTwC/Shared development by creating an account on GitHub.
A lot of network defense goes wrong before any contact with an adversary, starting with how defenders conceive of the battlefield. Defenders are awash in lists of assets—in system management services, in asset inventory databases, in BCDR spreadsheets. Attackers study the infrastructure as it is—not as an inaccurate mental model, viewed from an incomplete asset inventory system, or a dated network diagram.
Or read this on Hacker News