Mr. Perron used the phrase “threat actor”. How do we keep up with threat actors?
What are the approaches that are used to constantly be monitoring the new tactics and techniques of those who would try to cause problems to our systems? How do we keep tabs on them?