[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [cti] [Non-DoD Source] [cti] How to model the object in this situation
On 3/31/21 08:47, Bret Jordan wrote: > That sounds great. Yes, the current view of infrastructure is attacker > infrastructure because that is was the model designs that people were > bringing to the table. Often it is hard to get a large group like this > to move forward on something without a solid initial proposal and > commitment from people to drive the work forward. If you have that now, > that would be great. We've been working on some stuff in this space and will gladly contribute and help drive this forward. -- christian o. hunt principal security engineer cvoid@newcontext.com gpg key available on request
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]