Hacking back. It’s the stuff of movies: a corporate or government network is hacked by unknown parties who make off with critical information. In response, an intrepid technology expert tracks…
"hacking"
-
-
Security
Hacking Back: Risks, Challenges, Legalities, and Alternatives for Active Cyber Defense
by Peter Jacobs December 20, 2018The never-ending episodes of data theft and cyber attacks that have been plaguing both private businesses and government agencies seem to be completely one-sided. That is, bad actors attack a…
-
Security
Six Months on APT1 and Chinese Hacking Story Continues to Grow
by GTI Editors July 12, 2013Since the release of Mandiant’s report on Chinese cyber espionage units in February 2013 the way we think about security – both national security and network security has changed fundamentally. …
-
FeaturedSecurity
Cyber-Espionage: A Sophisticated Challenge to the Public Sector
by Kelsey Winick February 24, 2021Cybersecurity is top of mind for public sector organizations. Myriad attacks ranging from spear phishing to unauthorized access attempts to denial of service attacks keep cyber defenders on their toes.…
-
CybersecurityFeaturedSecurity
Hack-for-Hire Group, BAHAMUT, Exposed
by Kelsey Winick December 21, 2020A recent report exposed Hack-for-Hire group, BAHAMUT, for undermining numerous political causes and disruptions among NGOs. The report links “the cyberespionage threat group to a staggering number of ongoing attacks…
-
COVID-19CybersecurityRemote Work
Don’t Pay That Ransom! Smart Strategies for State and Local Governments to Mitigate Ransomware
by Jenna Sindle June 22, 2020According to a recent article in The Hill state and local governments across the United States have seen a sharp upswing in the volume of ransomware attacks since the beginning…
-
Security
The Burden of Insider Threats and Budget Revealed for Public Sector Organizations
by Jackie Davis June 11, 2020It’s no secret public sector organizations face an array of challenges in securing networks. From budget constraints to enforcing a security structure, organizations struggle to keep up with evolving threats.…
-
Security
Deception as a Service, the Next Tool to Add to Your Cyber Arsenal
by Jenna Sindle November 6, 2019As well as death and taxes, the one thing that you can be certain of in 2019 is that your online presence and information is under attack. While these unrelenting…
-
Security
Insider Threats and Foreign Governments Named Top Risks to Federal IT Systems by Government IT Security Professionals
by Peter Jacobs April 4, 2019There is redundant and inefficient security on endpoints. New ways of delivering security, such as network analytics and threat detection via AI, must be considered soon. – IT Director, Army…
-
Digital Transformation
Moving to the Cloud? What’s Your Security Strategy?
by Jackie Davis November 28, 2018Seven years ago when the Federal CIO’s office released the Cloud First policy, moving to the cloud seemed like a very complicated and expensive proposition. However, over the course of…