Visit the front pageVisit your profilePublish a blog post

Resources on the Mandiant APT1 China's Cyber Espionage Units report

As soon Mandiant released their APT1: Exposing One of China's Cyber Espionage Units 

Understanding Each Type of Targeted Attacker

When trying to defend an organization, it’s imperative to understand the nature of the thr

Anatomy of an Attack: From Spear Phishing Attack to Compromise in Ten Steps

 Skilled, determined attackers can break, enter and succeed within minutes. Other times, they spend days plotting, establishing backdoors and fortifying their positions inside your company. This sophistication and persistence presents challenges for those trying to scope, contain and remediate the threat. Here's what a typical economic espionage attack looks like.