Penny Allen, BAe Applied Intelligence talks Targeted Attack Evolution at CRESTCon & IISP Congress
Several years ago most companies out there didn’t even believe these attacks were a threat. Many of these same companies are now becoming all too aware of these threats and suffering attacks. However as we get better at detecting and protecting against these threats, the attackers are also working to improve their methods. We’ve seen a widespread movement from the use of spear-phishing emails to ‘watering hole attacks’ - the use of compromises to websites the target is expected to visit. Some
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@risk.net or view our subscription options here: http://subscriptions.risk.net/subscribe
You are currently unable to print this content. Please contact info@risk.net to find out more.
You are currently unable to copy this content. Please contact info@risk.net to find out more.
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Printing this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. Copying this content is for the sole use of the Authorised User (named subscriber), as outlined in our terms and conditions - https://www.infopro-insight.com/terms-conditions/insight-subscriptions/
If you would like to purchase additional rights please email info@risk.net