As a young intelligence officer, if you had told me an adversary could act anonymously and alone, easily acquire the most advanced weaponry, disrupt or take down almost any “connected” target globally, and our ability to prevent these attacks was systemically flawed – I would have been astonished. As always, all adversaries integrate intention, capability, and opportunity. With cyber warfare, a breadth of adversaries and individuals can bring to bear all three by continuously aiming at the U.S
Our bi-weekly Cyber Threats & Vulnerabilities Report is provided to our Red Sky Alliance Members to consolidate both prominent government and private cyber security reporting which include descriptions (TTPs), indicators of compromise (IoCs) and at times remediation directions.
Link to full report: IR-22-153-001_IntelSummary153.pdf
Cybersecurity is always low on upper management's priorities during a merger or acquisition, but it shouldn’t be. "Companies that are being bought and sold are often prime targets for cyberattacks," explained the CEO of cybersecurity solutions provider Industrial Defender, during a recent interview. "By enacting Operational Technology (and proactive cyber intelligence) security measures, organizations can avoid an exciting company milestone from becoming an infrastructure and security nightm
Note: this page contains paid content.
Please, subscribe to get an access.