Skip to main content

Top Attackers vs. Top Defenders in Cybersecurity - Part 1

Overview

Advanced Persistent Threat (APT) is a kind of cyber attack. From organized cyber criminals to state-sponsored cyber actors, today’s APTs can bypass most security controls and cause serious damages to many organizations. A skilled and determined cyber criminal can use multiple vectors and entry points to navigate around defenses, breach network in minutes and evade detection for months. APTs present a challenge for various organizations. [1]

GPS Vulnerabilities and Exploits

Global Positioning System (GPS) is a satellite navigation system used to determine the ground position of an object. GPS technology was first used by the United States military in the 1960s and expanded into civilian use over the next few decades. Today, GPS receivers are included in many commercial products, such as automobiles, smartphones, exercise watches, drones and other GIS devices.

How Easy Can Someone Know Where You Are Through Your Phone?

Mobile Network Standard That Affects Us All

Because many of us have smartphones, the target on our backs is bigger than ever. Hackers, even nation states, are targeting smartphones to tap into cameras and microphones, but crucially and most of all, your data including your geo-location data.

Asymmetric Threats in Cybersecurity

Asymmetric Threat

The concept of “asymmetric threat” has its root from the military [1].  The asymmetric threat is defined as an attempt to circumvent or undermine an opponent’s strengths while exploiting the weakness, using methods that differ significantly from the opponent’s usual mode of operations.   

The ABC's of Cybersecurity Models

NIST Cybersecurity Framework

The Framework [1] focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes.

The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover.  When considered together, these Functions provide a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk.

Subscribe to Cyber Security