Get a Pentest and security assessment of your IT network.

Cyber Security

How to Model Risk in an Apex Predator Cyber-World

Threat-intelligence researchers have borrowed the apex predator concept from ecology to describe today s multi-organizational, multinational threat actors. Such actors are working at capabilities that exceed those of regular actors, thanks to the resources they have at their disposal. The evolution of these threats could provoke an overhaul of risk analysis and management. The second variable is the level of effort necessary for a successful attack, which can be assumed to be a precursor to the formation of the attack. The Open Factor Analysis for Information Risk (FAIR) standard calls threat capability

Source: https://threatpost.com/how-to-model-risk-in-an-apex-predator-cyber-world/145499/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security