From the Fall 2015 Issue

Social Engineering: The Root of the Cyber Threat

Author(s):

Douglas Rausch, President, Aurora CyberSecurity Consultants, Inc.

R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC

When conducting reconnaissance of your cyber infrastructure, attackers look for weaknesses they can utilize to successfully penetrate your infrastructure with the least expenditure of resources and risk of being detected. The vulnerabilities created by human action or inaction have always been a potential attack vector. The increased focus on adding technical controls to bolster cyber … Read more