Types of Cyber Attackers and their Motivations

Published on July 28th, 2015 | by admin

In previous blog posts we’ve talked about how human behavior is a key factor in both the drivers for cyber security threats and also an important tool in understanding how to combat the outcomes of those... Read More


Security and the Human Factor

Published on July 16th, 2015 | by admin

Many people talk about security. And when they do, they talk of encryption and digital signatures, access control, malware and software vulnerabilities. It is true that security is all of these things and more. But software... Read More


The Evolution of Targeted Attacks

Published on July 7th, 2015 | by admin

Once upon a time, the life of a hacker was a simple one. They’d create a virus and push it out to whoever was unlucky enough to pick it up. The Brain boot sector virus, for... Read More


The Why, Where and How of an Advanced Persistent Threat

Published on June 18th, 2015 | by admin

Advanced Persistent Threat or APT has seemingly been the domain of the well-funded hacker, often attributed to government funded and highly organized teams of hackers designed to go after foreign targets. But, just like all technology... Read More

Back to Top ↑