Monthly Archives: October 2013

Defense against APTs: technology plus education

Malware, hacking, and other techniques are commonly used by cyber criminals in order to steal data from targeted companies.

Phishing, or trying to obtain usernames, passwords, or other sensitive information by impersonating a trustworthy entity, is part of 95 percent of all state-affiliated espionage attacks, according to Verizon’s 2013 Data Breach Investigations Report. The organization reviewed 47,000 reported security incidents from the year 2012.

Government shutdown impact on information security

The first government shutdown in 17 years will undoubtedly put federal information security to the test.