The Attack Continuum Before, during and after: a security framework BEFORE DURING AFTER Intelligence Point-in-Time Continuous Protection Protection Network Endpoint Mobile Virtual Cloud X Threat Intelligence Point in Time Continuous 27