It’s October, and for those in the field of cyber security (digital security), we know of this month as a special milestone in the eighteenth year of the twenty-first century. For those of you new to it, October marks fifteen years since the launch of the National Cyber Security Awareness Month (NCSAM). In the wakeRead more
Today’s online adversaries possess unprecedented capabilities along with the financial backing, intelligence, and resources to conduct extremely sophisticated attacks. From state-sponsored cyber criminals to orgarnized hackers to other cyber espionage actors, the list of threat actors is large and growing. DOWNLOAD DownloadRead more
Security isn’t the only thing that’s become better with time. Cyber-attacks are now well-timed, smart, and stealthy. As they say, progress works both ways. Cyber criminals are adept at building tools and utilizing techniques that mask their footsteps, making it difficult for traditional signature-based technologies to identify them. In fact, it’s common for an intrusion to go undetected from its date of origin for days, weeks, or even months.