Current Topics and Information

Focused on the ever-changing information security landscape

Sub-header Photo

ACCUVANT BLOG

Mapping Cyber Attacks to Maslow's Hierarchy of Needs

Maslow’s hierarchy of needs is basically a theory that aims to understand what motivates people, represented as a pyramid that maps the different levels of needs. At the lowest level are the basic human needs that are required to function. As those needs are met, individuals move up the hierarchy to fulfill deeper and more complex needs. [...] Read more

Read more

Offense Wins Games…Defense Wins Championships: Tips to Build Your Security Strategy. Part Two – Game Day!

Now it’s game day for your team. They have gathered in the locker room for pre-game meetings, rituals and pep-talks by fellow coaches and team captains. The time has come for them to execute on the game plan that has been laid-out, practiced and approved by team management. The adrenaline is pumping … scenarios of how the game will play out running through the heads of the coaches, players and fans. Will the preparation be enough? [...] Read more

Read more

Offense Wins Games…Defense Wins Championships: Tips to Build Your Security Game Plan

Avid sports fans from around the country are eagerly awaiting the much anticipated Super Bowl match-up between the New England Patriots and the Seattle Seahawks this Sunday. As fans prepare by stocking up on snacks and putting their beer on ice, the Super Bowl bound teams are “in the zone” preparing for one of the biggest games of their careers. [...] Read more

Read more

The Business Case For an Intelligence-Driven Security Program

Threat intelligence is a term that causes some people to roll their eyes – mainly because they’ve been relentlessly bombarded with the typical hype and hyperbole. The fact is, a modern enterprise security program that does not draw from an intelligence-driven approach lacks focus and is effectively missing something crucial. [...] Read more

Read more

Cyber Security Public Policy

Imagine a scenario where a highly motivated, trained, and well equipped enemy launched an invasion against the United States. Upon arriving at our shores, this enemy began grabbing anything of value—everything not literally fastened to the ground, and loaded these things onto a ship to take it back home. This scenario sounds far-fetched—but it’s happening every hour of every day here in the United States. [...] Read more

Read more
(158 Results)