The Psychology of Cyber
Social Engineering: The Root of the Cyber Threat
Author(s):
Douglas Rausch, President, Aurora CyberSecurity Consultants, Inc.
R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC
When conducting reconnaissance of your cyber infrastructure, attackers look for weaknesses they can utilize to successfully penetrate your infrastructure with the least expenditure of resources and risk of being detected. The vulnerabilities created by human action or inaction have always been a potential attack vector. The increased focus on adding technical controls to bolster cyber … Read more