<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

The DPRK Sideshow: Why the missile escalation cycle shouldn't be the main concern

Nation-state Attack

The DPRK Sideshow: Why the missile escalation cycle shouldn't be the main concern

The Democratic People’s Republic of Korea’s (DPRK) cyber activity has often been talked about in terms of radical actions and Bond-style plots. However, their activity appears to be driven by three rational motives: spying, attacking, and racketeering.

Predicting the line between cyberspace and geo-political action

Nation-state Attack

Predicting the line between cyberspace and geo-political action

The cost, actual damage, and number of organizations hit by the NotPetya attack are likely to be concealed by attempts to maintain stock prices and the patchwork of disclosure regulations around cyber attacks.

Russia and nation-state hacking tactics: A report from Cybereason Intelligence Group

Nation-state Attack

Russia and nation-state hacking tactics: A report from Cybereason Intelligence Group

examines Russia and the tactics and procedures they use to conduct global attacks on nations and corporations.

Election hacking not fundamentally a cyber issue

Nation-state Attack

Election hacking not fundamentally a cyber issue

Regarding the possibility of a foreign state influencing the outcome of an election due to cyber influence, the most important thing to understand is that hacking an election isn't, fundamentally, a cyber-issue.

Nation-state Attack

Cyber crime adds a powerful new weapon to terrorists’ arsenal and it’s only a matter of time before they deploy it

An area of growing international concern in the world of cyber is the terrorist threat. It’s an interesting ecosystem for sure. Traditionally, terrorist organizations were considered to be low-tech with basic skills in cyber security and information technology in general.

When the company that's protecting you could also be the adversary

Endpoint Detection and Response

When the company that's protecting you could also be the adversary

The increase of nation-state actors hiring companies, some of which appear to develop cyber-security products, to conduct hacking operations is akin to a firefighter who’s also an arsonist.

Cybereason Threat Intel Report: Blurring the lines between nation-state and for profit

Nation-state Attack

Cybereason Threat Intel Report: Blurring the lines between nation-state and for profit

We've seen an increase in nation-states contracting private companies to accomplish hacking operations and intelligence gathering. These groups operate with incredible sophistication, while enjoying a cloak of semi-protected "status" for their malicious activities.

Information security priorities for Trump's administration

Cybersecurity

Information security priorities for Trump's administration

Cybersecurity needs to be a top priority for the administration of Donald Trump. The first task should be shoring up government IT systems. As recent attacks have shown, adversaries aren’t afraid to go after political organizations.

Lior Div in Network World: Information security priorities for the next presidential administration

Nation-state Attack

Lior Div in Network World: Information security priorities for the next presidential administration

Cybersecurity needs to be a top priority for the administration of Donald Trump. The first task should be shoring up government IT systems. As recent attacks have shown, adversaries aren’t afraid to go after political organizations. There’s no reason to suspect they won’t continue to target political entities such as the Democratic National Committee or step up attacks on government agencies.

How the US government can help businesses fight cyber attacks

Nation-state Attack

How the US government can help businesses fight cyber attacks

When a criminal robs a store, the police visit the scene, conduct an investigation and try to bring the perpetrator to justice. What happens when a criminal breaches that same store’s server and makes off with its customer’s credit-card numbers?