Get a Pentest and security assessment of your IT network.

News

Recognize the Threats, Part 2 – Book Excerpt

Michael Lines is working with Information Security Media Group to promote awareness of the need for cyber risk management. Lines: Damage, Espionage and Sabotage are first order threats, in that the threat actors discussed in the chapter “Know Your Enemy” are directly behind them. Infractions are a second order threat, because of the likelihood of harm occurring to the business as a consequence of the first order attacks, including lawsuits, fines and sanctions, not to count customer loss and share price impacts.”]

Source: https://www.cuinfosecurity.com/blogs/recognize-threats-part-2-book-excerpt-p-3194

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Who and why is attacking companies in the Nordic Countries?

News

Shamoon Malware, cyber espionage tool, cyber weapon or