Threat landscape

 

 

 

 

 

When looking at the threat landscape, there are different types adversaries and they pose different types of threats depending on their capabilities, intentions, and the assets they are targeting. For example, nation states might target research companies or military websites trying to steal confidential and proprietary data. In addition, companies react to the loss of assets differently. The level and types of mitigation strategies will vary among organizations depending on whether there is a loss of one asset or of an entire category of assets.

For your initial post, identify a recent cybersecurity incident (within the last two years). Briefly summarize the incident, and post a link to an article on the incident if possible. Try to identify the threat actor(s) and the goal or intent of the attack. If there is no “why” put on your adversarial thinking cap and hypothesize what you think is the “why”.

 

 

Our customer support team is here to answer your questions. Ask us anything!