The Risk of Triangulation: You May Just be a Piece of the Puzzle

F5 Labs' Preston Hogue writes for SecurityWeek, discussing how attackers might be targeting your data with an eye on a larger prize.
October 16, 2018
1 min. read

As the world’s ongoing conversion to the digital realm continues, the risks involved with protecting sensitive information will only intensify.

For security teams, this means expanding your view of risk and considering factors outside your company when evaluating potential motivations for a breach. Companies have to keep an eye on current events in ways that were never under IT’s purview in the past. And that means you have to bring in the right talent to do so.

Having that broader view is important because the different motivations behind today’s attacks mean they can seemingly come out of nowhere. How you look at the information itself is no longer the sole concern. Your organization and your data may just be a piece of the puzzle.

One of the more intriguing ways this is playing out is in the murky world of cyber espionage—and just about every national government is engaged somehow.

Read the full article published September 11, 2018 here: by SecurityWeek.

Join the Discussion
Authors & Contributors
Preston Hogue (Author)

More from Learning Center

Forward and Reverse Shells
Forward and Reverse Shells
09/15/2023 article 5 min. read
Web Shells: Understanding Attackers’ Tools and Techniques
Web Shells: Understanding Attackers’ Tools and Techniques
07/06/2023 article 6 min. read
What Is Zero Trust Architecture (ZTA)?
What Is Zero Trust Architecture (ZTA)?
07/05/2022 article 13 min. read