I have recently been thinking about the threat landscape, what it consists of and who are the so-called "players" in the field, what kind of attack surface they provide, what are the typical attacks and what to do about it. This is a broadly generalized blog post about the topic. These days anything that is put online or operates online can get hacked. If you have a network, IP or simply
from Threat Landscape – opportunistic vs targeted?
No comments:
Post a Comment