In this blog post, we look in detail at the various stages that combine to form a complete kill chain, and how knowledge of the model can help to better inform an organisation’s efforts to secure its technical estate, systems and data against attacks and attempted compromise.