nation-state attack



Nation-States and Data Breaches

Nation-States and Data Breaches

Cyber intruders now use in-country assets to mask their location, making attribution challenging. If the state actor has a grudge that they want to air, then they will use their own addresses to get their message across to the company and government.





Waking Up to Zero Day Nightmares

Cyber-defense today is not about stopping intrusions. It is about creating architectures and processes that minimize losses and limit how far into the network intruders can go after they do manage to penetrate the perimeter with zero day attacks and similar exploits.



Defend Against Advanced Persistent Threats (APTs) with Privileged Access Management

The analogy I like to use for IT security in today’s organizations is that of a candy with a hard shell and gooey interior. Attackers now know how to break through the outer security – the shell. Since the interior security is weak, or gooey, complete control over most systems can be obtained in a matter of minutes.


Chinese Cyber Attack on Canada

The Chinese cyber attack on Canada demonstrates the reason why privileged account passwords should never be shared among employees, or left static and unchanged. In the description of this attack, hackers were able to gain access to sensitive systems via access to these credentials.