How do you profile actors and defend your systems when multiple threat actors are working together? In Part 2, Cisco Talos proposes an extended Diamond Model to analyze complex relationships between attackers.
First seen on blog.talosintelligence.com
Jump to article: blog.talosintelligence.com/compartmentalized-threat-modeling/
![]()

