This website uses cookies
We use cookies to continuously improve your experience on our site. More info.
A methodology for selecting countermeasures to minimize a cyber-asset's susceptibility to cyber-attack over a range of attack TTPs associated with the Advanced Persistent Threat (APT).