Cyberwar: How nations attack without bullets or bombs
Russia, Iran, China, and the U.S. are among the world’s leading practitioners of cyberwarfare — state-on-state hacking to gain strategic or military advantage by disrupting or destroying data or physical infrastructure. Unlike combat with bullets and bombs, cyberwarfare is waged almost entirely with stealth and subterfuge, so it’s hard to know when and where it’s occurring, or whether full-scale cyberwar is on the horizon.
Hacker lexicon: What is a supply chain attack?
What if the legitimate hardware and software that makes up your network has been compromised at the source? That insidious and increasingly common form of hacking is known as a "supply chain attack," a technique in which an adversary slips malicious code or even a malicious component into a trusted piece of software or hardware. From NotPetya to SolarWinds, it’s a problem that’s not going away any time soon.
The makings of a better cybersecurity hire
Cybersecurity is a complex discipline that evolves and expands at an exponential rate alongside the digital revolution. Cybersecurity is about teamwork. The discipline is ever-changing and all-encompassing. Hence, the successful CISOs of the future will be those who can see the broader threats and compose the best teams to address them — and that means looking outside the box for qualified, motivated candidates.