Before, during and after a cyberattack



| Security Magazine