Hacktivists, Cyber Criminals, and Advanced Persistent Threats, Oh My!
When building out your organization’s cyber security strategy, it’s easy to conceptualize hackers as one-dimensional antagonists without paying consideration to their underlying rationale.
Some hackers are motivated by money or fame, while others are motivated by politics or their desire to make a statement. Some hackers cast a wide net, selecting targets on an opportunistic basis, while others leverage carefully-planned attacks against specific organizations.
The individuals behind a cyber threat can be classified into three high level categories, each with distinct motives, targets, and methods of attack. Being able to distinguish between these groups can deepen your understanding of the threat landscape, better equipping you to consider the appropriate defenses.
Go to Zero Day Magazine and read the full article to learn best practices for lessening the worry of cyber threats.
Let us hear from you.
We encourage our readers to engage in an ongoing discussion of the latest security developments. Keep the conversation going by emailing us your thoughts and questions on the latest issue. What impact do you see the widespread adoption hybrid clouds having on the future of cloud security? Have you noticed the recent emergence of new cloud vulnerabilities? Do you agree or disagree with the assertion that cloud adoption has no unique risks? Let us know by emailing your comments to email@example.com.