Your organization has been breached. What do you do now? Philip Lieberman explains in this 4-minute Game Changers Silicon Valley interview.
Here’s the situation. This is a garden variety cyber attack. In fact, many companies are victims of these types of attacks and choose to pay off the attackers.
WikiLeaks withheld the source code for the CIA hacking tools. One might wonder though, what could happen if WikiLeaks did publish this code?
We’ll kick off 2017 with a look back at our five most popular cyber security stories of 2016, as measured by number of visitors.
The lesson from the Panama Papers leak is that it is up to the client to inspect the cyber warfare capabilities of their law firm. If there is little to show, then they should consider their confidentiality blown.
These survey results seem to show that it doesn’t matter how many people you have guarding your network. Persistent hackers will always find a way in.
As with any ambitious endeavor, a successful cyber attack requires careful planning and precise execution. One thing that effective hacks have in common is the ability to remain covert – right up until the moment that the time is right and the attackers strike
One of the lessons from the Sony Pictures hack is that it’s easy for criminal hackers and nation-state attackers to nest within their target’s environment – and existing perimeter security and vault tools cannot prevent this.
If you don’t want your company to be the next data breach headline, start with the assumption that every workstation is compromised, and every device connected to the network is infected and under the control of outsiders.
Information theft is the tip of the malware iceberg, and inconvenient as it might be, the bigger issue is that those who have the ability to steal information, also have the ability to search and destroy. In the same way that someone who has gained anonymous access to a network can exfiltrate data, that same access level provides the ability to disable a system.