Chinese Cyberattacks Unrelenting And Will Not Stop
It is all part of the Chinese strategy to steal technology and information as they work on being the top country in the world. There is an excellent article on…
Defend Your Systems
It is all part of the Chinese strategy to steal technology and information as they work on being the top country in the world. There is an excellent article on…
From WSJ article On May 7th hackers were able to shut down a number of city of Baltimore computers. They demanded $100k worth of bitcoins to release their stranglehold. On…
It may be hard to source some attacks, but it depends on the attack as well. We also have to decide what data to use as to who got attacked?…
Another Thotcon presentation was very good, unique and moves the industry forward. Julian Cohen presented This idea: “Understanding Your Adversaries” In his talk: “Adversary-Based Threat Analysis” He explained that in…
Thotcon (Chicago’s Hacking Conference) thoughts… Saw several good Cybersecurity presentations while one of the keynotes “Josh Corman” discussed the burnout of the infosec opsec community. This is a problem for…