Threat Personas
We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, technology and business teams. Free cyber threat actor examples for you to pick-up, tailor, and use in your organisation!
Open