December 2014
Intermediate to advanced
42 pages
57m
English
At this point, the book has covered why you are building a cyber-threat capability, what you are going to need, and how you plan to implement it. The next chapter covers going out to the market and deciding who to buy from and the six key axes on which to evaluate an intelligence or data vendor.
Read now
Unlock full access