Get a Pentest and security assessment of your IT network.

News

How Suttons Law applies to cybersecurity today

William Francis Sutton, Jr. began his successful and profitable 40-year career as a bank robber. Suttons Law: Why do threat actors go after cyber assets? Because that’s where the consequences of significance are. Vulnerability and Consequences are the two components of cybersecurity that organizations have the most control over. Many organizations are not nearly focused enough on closing known vulnerabilities that allow breaches. The most-overlooked aspect of cybersecurity risk is avoiding bad consequences, he says.”]

Source: https://www.csoonline.com/article/3234630/how-sutton-s-law-applies-to-cybersecurity-today.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months