In order to conduct a discussion about cyber terrorism, one needs to differentiate between terrorism and other kinds of threats in cyberspace, such as organized crime, espionage, cyber war and activism. Terrorism is characterized as an act intended to achieve political objectives through influencing the decision making process of a nation state. Another characteristic is that it is an act intended to cause fear through violent means. For instance, activism also wants to affect political decision, but does not use intimidation of the public to do so.
Computer viruses and malware are an unfortunate fact of life in today’s digital world – for individuals and companies alike. Threats of this type often present a consistent behavior that is repurposed for attacking individuals and companies. Any personal or business computer connected to the internet, whether directly or through a connected network, is in harm’s way and presents an entry point for malicious code and those looking to exploit vulnerabilities. Combating this form of attack is challenging enough, but there are even more dangerous threats facing large companies and organizations. Called Advanced Persistent Threats (APTs), this article will explain what they are and how cyber security experts are using “deception technology” to defend against them. What is an Advanced … Read More
Why Do Companies Need Cyber Insurance? Cyber-Attacks are Becoming Less “Personal” Personal cyber-attacks are usually carried out as a means of financial gain. The most common attacks involve the theft of money, tax returns, health records, social security numbers, bank accounts, credit card numbers, driver’s license numbers and other forms of personal identification. Hackers often use this sensitive information to successfully steal somebody’s identity without their knowledge. Unfortunately for the corporate world, physical attacks, extortion, and hijackings are escalating at a rapid pace. When hackers strike companies and corporations, the stakes can be much higher costing them millions of dollars to clean up the mess. Cyber-attacks often lead to a costly interruption of business as well as irreversible damage to … Read More
Formal threat intelligence existed as early as, if not before, the time of Sun Tzu and has recently become one of many niche disciplines to ride a wave of mainstream popularity in the business world. A quick Google search of threat intelligence reveals a staggering 865,000 results in less than half a second. Prefix it with the nebulous idea of “cyber” and you refine it to a much more manageable 345,000 results. lf you understand how Google works you realize that you are still only looking at the tip of the iceberg. Refer to numerous popular white papers or vendor pitches and you will find a variety of interesting and varied definitions. We have read these papers, leveraged our decades … Read More
Cyber-attacks have escalated to the point where they threaten all businesses today, however, given the sensitivity and confidentiality of information at law firms they have been and will remain one of the largest targets. Whether the firm serves as custodians of clients’ intellectual property, commercially sensitive information or investigators of possible M&A transactions, the desire to hack into these deals can be and will continue to be a great risk. I would go so far as to say that some law firms face an even greater risk than the typical mid-sized company, especially those who deal with Patents and Intellectual Property as they’re threatened not only by cyber criminals but also nation-state hackers that are after commercial secrets and patents. … Read More
We’ve been doing it wrong for a while now, over the last 20 years or so we’ve kept the discussion regarding security highly technical. Unfortunately, our greatest achievement was to exclude the c-levels and the board of directors from the conversation and in doing that we’ve lost hundreds of years of organizational memory in problem solving, overcoming challenges, and mitigating risk. I’m arguing that Cybersecurity isn’t a technical issue, it’s a business issue with strong behavioral and cultural influencers. The flourishing of the Cybersecurity scene alongside the rise in cyber-attacks lends a certain credence to this theory. Yes, yes…one can argue that the increase in cyber-attacks is derived both from the shifting of conventional crime to cybercrime and the active … Read More
The ability to prioritize resources on what matters most is a common differentiator between elite and mediocre businesses. Successful companies know what is ‘core’ to their business mission and what is ‘context’. One company’s context is another company’s core. For example, few companies are in the business of human resources, facilities, or payroll. Rather than attempting to haphazardly fulfill these functions, many corporations outsource to other companies who specialize in these services, allowing each company to focus their resources on their core business. Proficiency in shaping and scaling IT infrastructure and services to match business needs is key to the appeal of cloud computing. Cloud service providers specialize in one thing: outsourced infrastructure. They invest massive amounts of capital to … Read More