Changes

Jump to navigation Jump to search
no edit summary
Line 11: Line 11:  
*In the 2010s, cybersecurity went mainstream: most corporations had to say (if not do) something about client privacy and data security.<ref>[https://www.forbes.com/sites/forrester/2019/12/18/decade-retrospective-cybersecurity-from-2010-to-2019/?sh=60d1b05d4d51 Decade Retrospective, Cybersecurity, Forbes]</ref>
 
*In the 2010s, cybersecurity went mainstream: most corporations had to say (if not do) something about client privacy and data security.<ref>[https://www.forbes.com/sites/forrester/2019/12/18/decade-retrospective-cybersecurity-from-2010-to-2019/?sh=60d1b05d4d51 Decade Retrospective, Cybersecurity, Forbes]</ref>
 
*In 2011, researchers at Lockheed Martin standardized cybersecurity jargon with their [https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html Cyber Kill Chain] model, published in their white paper, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains."<ref>[https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf Eric M. Hutchins, Michael J. Cloppert, & Rohan M. Amin.2011."Lockheed Martin Kill Chain.]</ref>
 
*In 2011, researchers at Lockheed Martin standardized cybersecurity jargon with their [https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html Cyber Kill Chain] model, published in their white paper, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains."<ref>[https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf Eric M. Hutchins, Michael J. Cloppert, & Rohan M. Amin.2011."Lockheed Martin Kill Chain.]</ref>
*In 2013, nonspecialists became more aware of nation-state cyberattacks with Mandiant's release of the [[APT1 Report]], which outlined how China was able to quickly steal intellectual property from US firms.   
+
*In 2013, nonspecialists became more aware of nation-state cyberattacks with Mandiant's release of the [https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units APT1 Report], which outlined how China was able to quickly steal intellectual property from US firms.   
 
*In 2014, [[NIST]] released its first cybersecurity framework, which conceptualized how to identify, protect, detect, respond, and recover from attacks.<ref>[https://www.nist.gov/cyberframework Cyberframework, NIST]</ref>
 
*In 2014, [[NIST]] released its first cybersecurity framework, which conceptualized how to identify, protect, detect, respond, and recover from attacks.<ref>[https://www.nist.gov/cyberframework Cyberframework, NIST]</ref>
  
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits

Navigation menu