
- Charlotte Anderson
Defining the Possible Part 3 of 3: 6 components to developing a cyber catastrophe scenario
Building a cyber catastrophe scenario involves six key components: attackers, targets, objectives, vulnerabilities, impact and consequences.
Read Article

- Charlotte Anderson
SolarWinds and Constant Contact: “Sister” Supply Chain Attacks
SolarWinds actors’ repeat supply chain attacks show different courses to similar objectives
Read Article

- Charlotte Anderson
Attack Vector Deep Dive: Mobile Attacks
The main types of cyber attacks on mobile devices
Read Article

- Charlotte Anderson
Attack Vector Deep Dive: Exposed Databases
This blog discusses the main types of attacks that occur on exposed databases, and important security steps toward protecting enterprises from this risk.
Read Article

- Charlotte Anderson
ECB Fears Over Financial Liquidity Cyber Risk a Prescient Warning
Operational outages that encrypt or destroy balance accounts at a major bank could cause a liquidity crisis.
Read Article

- Charlotte Anderson
Avast breach highlights supply chain attack threat
Several news outlets reported that Avast, a firm owning 10% of global market share for anti-virus solutions, was breached through an insecure VPN account.
Read Article