by Gate 15 | Oct 16, 2018 | Uncategorized
“If you don’t immediately stop the clearing of the Hambach Forest, we will attack your servers and bring down your web pages, causing you economic damage that you will never recover from…” This blog has routinely featured posts addressing the idea of blended...
by Gate 15 | Oct 14, 2018 | Uncategorized
by Andy Jabbour Seemingly every day a new data breach is reported, a new cybercrime effort is launched, fraud and extortion attempts are made, and organizations are attacked from threat actors from script kiddies to nation-states. The FBI has done a remarkable job of...
by Gate 15 | Oct 12, 2018 | Uncategorized
“Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they weren’t. The interconnected nature of the world and the way it’s built in 2018 has brought us exciting and revolutionary...
by Gate 15 | Sep 25, 2018 | Uncategorized
A new report from the Cyber Threat Alliance (CTA) highlights one type of blended threat that organizations should be aware of. In this case, CTA demonstrates a cyber threat that can have crossover impacts and harm physical equipment. On 10 Sep, CTA released a new...
by Gate 15 | Sep 17, 2018 | Uncategorized
Sean Lyngaas, @snlyngaas, writing in CyberScoop last week, wrote, “When it comes to protecting faith-based organizations from hackers, divine intervention will only get you so far.” And he’s right! Security, like other activities we may give prayer...
by Gate 15 | Aug 20, 2018 | Uncategorized
US critical infrastructure, most recently defined in President Obama’s 2013 Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience, is presently comprised of sixteen sectors[1]. Among these are several “critical lifeline” sectors,...