Understanding the behaviour of attackers after they have penetrated your systems is not about preventing attacks but rather focusing on what happens once they have access to your networks.
In this second part of a two-part article, Tracey Caldwell looks at how organisations can classify and counter developing threats. Sharing intelligence is crucial, but it's important to strike a balance between the benefit of information sharing and the risk of tipping off attackers that the organisation is on to them.