Higher Education: A Complex Array of Threats
By Brett Zupan There is a tremendous amount of information that analysts, security and risk leaders, executives, and others try to process daily. In the abundance of noise, we strive to promote a simple idea to developing a threat-informed, risk-based approach...
PERSPECTIVE: Hostile Events Attack Cycle from Target Selection Through Rehearsal Stage
By David Pounder This is the second part of an ongoing series focused on the Hostile Events Attack Cycle. Previously the discussion centered on initial surveillance in potential targets. Specifically, as part of the research into the potential targets, the attacker...
Security Spotlight: An Interview with NH-ISAC President Denise Anderson
In a recent post introducing the preparedness efforts that the National Health Information Sharing and Analysis Center (NH-ISAC) is taking to support increased member awareness and preparedness relating to blended threats, we addressed the importance of developing a...
PERSPECTIVE: Picking Target, Surveillance Begin the Hostile Events Attack Cycle
By David Pounder Threats operate in all shapes and sizes, and whether by design or not they tend to follow a common process, which can be identified as the Hostile Events Attack Cycle. Whether it is a physical attack designed to inflict mass casualties or an attack on...
Security Spotlight: An Interview with REN-ISAC Executive Director, Kim Milford
A recent post introduced the preparedness efforts that the Research and Education Network Information Sharing and Analysis Center (REN-ISAC) is taking to promote threat awareness, security coordination, and preparedness across the REN-ISAC and Higher Education...
Action Required: Reboot Your Router (Now).
It is rare that the US Government asks everyone to do something, and it can be challenging to get that word out. The following was recommended by the FBI in a Public Service Announcement (PSA) today, 25 May 2018, in response to dangerous malware: The FBI recommends...