Current Topics and Information

Focused on the ever-changing information security landscape

Sub-header Photo

ACCUVANT BLOG

Digital Sleight of Hand

It’s a good sign that attackers find themselves having to become more sophisticated and creative to beat corporate defenses. That being said, there is still no shortage of low hanging fruit out there, but let’s focus on the high-bar for a moment. [...] Read more

Read more

Mapping Cyber Attacks to Maslow's Hierarchy of Needs

Maslow’s hierarchy of needs is basically a theory that aims to understand what motivates people, represented as a pyramid that maps the different levels of needs. At the lowest level are the basic human needs that are required to function. As those needs are met, individuals move up the hierarchy to fulfill deeper and more complex needs. [...] Read more

Read more

Offense Wins Games…Defense Wins Championships: Tips to Build Your Security Strategy. Part Two – Game Day!

Now it’s game day for your team. They have gathered in the locker room for pre-game meetings, rituals and pep-talks by fellow coaches and team captains. The time has come for them to execute on the game plan that has been laid-out, practiced and approved by team management. The adrenaline is pumping … scenarios of how the game will play out running through the heads of the coaches, players and fans. Will the preparation be enough? [...] Read more

Read more

Offense Wins Games…Defense Wins Championships: Tips to Build Your Security Game Plan

Avid sports fans from around the country are eagerly awaiting the much anticipated Super Bowl match-up between the New England Patriots and the Seattle Seahawks this Sunday. As fans prepare by stocking up on snacks and putting their beer on ice, the Super Bowl bound teams are “in the zone” preparing for one of the biggest games of their careers. [...] Read more

Read more
(160 Results)