WikiLeaks withheld the source code for the CIA hacking tools. One might wonder though, what could happen if WikiLeaks did publish this code?
We’ll kick off 2017 with a look back at our five most popular cyber security stories of 2016, as measured by number of visitors.
The lesson from the Panama Papers leak is that it is up to the client to inspect the cyber warfare capabilities of their law firm. If there is little to show, then they should consider their confidentiality blown.
These survey results seem to show that it doesn’t matter how many people you have guarding your network. Persistent hackers will always find a way in.
As with any ambitious endeavor, a successful cyber attack requires careful planning and precise execution. One thing that effective hacks have in common is the ability to remain covert – right up until the moment that the time is right and the attackers strike
One of the lessons from the Sony Pictures hack is that it’s easy for criminal hackers and nation-state attackers to nest within their target’s environment – and existing perimeter security and vault tools cannot prevent this.
If you don’t want your company to be the next data breach headline, start with the assumption that every workstation is compromised, and every device connected to the network is infected and under the control of outsiders.
Information theft is the tip of the malware iceberg, and inconvenient as it might be, the bigger issue is that those who have the ability to steal information, also have the ability to search and destroy. In the same way that someone who has gained anonymous access to a network can exfiltrate data, that same access level provides the ability to disable a system.
Those who seek to compromise your security are using automation to find resources and access available to them. The only solution is to be even more automated than your attackers by identifying holes in your security and closing them faster than they can be exploited. That’s because as environments get larger, there are simply not enough humans available to handle many privileged identity management scenarios – manually or via scripts.
If you’ve been following the news over the last 6 months or so, you may have noticed an uptick in articles related to Critical National Infrastructure (CNI) security legislation. You may have also seen more reports of cyber-attacks against a wider variety of targets by entities other than criminal elements seeking financial gain. Why is that?