Articles posted in March, 2016

Today’s Hackers are High Tech Conmen. Plan Your Security Strategy Accordingly.

3/17

Today’s Hackers are High Tech Conmen. Plan Your Security Strategy Accordingly.

Today’s security strategies are predicated on attacks being technology based. Even after dismissing perimeter defense as passé, vendors point to end-point defense, east/west containers, internal network defense, catching Indicators of Compromise (IoCs) early, pitting our technological defenses against the hackers.  In fact, a key factor for most high-profile government breaches has been social engineering. This includes the latest DoJ/DHS breach that put a lot of government employee’s contact information on the street.