“Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices…until they…
A new report from the Cyber Threat Alliance (CTA) highlights one type of blended threat that organizations should be aware…
In this blog, we’ve written a few times about the idea of “Blended Threats,” and some of the ways the…
By Brett Zupan There is a tremendous amount of information that analysts, security and risk leaders, executives, and others…
In a recent post introducing the preparedness efforts that the National Health Information Sharing and Analysis Center (NH-ISAC) is taking to…
By Brett Zupan and Andy Jabbour Across critical infrastructure, organizations must continually reassess their risks based on an ever-changing…
By Andy Jabbour This is an update to the original post, “Terminology for $500. What Are Blended Attacks?” 26 May…
By Andy Jabbour There is a tremendous amount of information that analysts, security and risk leaders, executives, and others…