Kai Pfiester

Kai Pfiester

December 15, 2023 | New Jersey Law Journal

The Five Paths of Cyberattacks: What To Know and How To Be Ready

There are essentially only five paths an attacker can take while performing a cyberattack on a target, and the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a knowledge base that describes the actions and behaviors of cyber-attackers across various stages of the cyberattack lifecycle.

By Kai Pfiester

8 minute read

November 17, 2023 | New Jersey Law Journal

Cybersecurity—A Journey, Not A Destination

Cybersecurity is a journey, not a destination. We cannot purchase a product or service that magically solves all our problems involving information security. Certainly, we can mitigate risk. But we can never eliminate it.

By Kai Pfiester

7 minute read

March 31, 2016 | New Jersey Law Journal

A Few Tips to Bolster Your Firm's Cyber-Security

Five tips for preventing a cyber-attack on your law firm.

By Kai Pfiester

13 minute read

December 09, 2015 | New Jersey Law Journal

Social Engineering: The Attack Your Firewall Can't Stop

Social engineering—a nontechnical means of intrusion cyber criminals use that relies mostly on human interaction—is one of the greatest threats that organizations encounter today.

By Kai Pfiester

7 minute read

December 09, 2015 | New Jersey Law Journal

Social Engineering: The Attack Your Firewall Can't Stop

Social engineering—a nontechnical means of intrusion cyber criminals use that relies mostly on human interaction—is one of the greatest threats that organizations encounter today.

By Kai Pfiester

7 minute read

August 12, 2015 | New Jersey Law Journal

Stop Hackers With Two-Factor Authentication

An explanation of how crucial two-factor authentication is for an effective cyber-security infrastructure.

By Kai Pfiester

7 minute read

August 12, 2015 | New Jersey Law Journal

Stop Hackers With Two-Factor Authentication

An explanation of how crucial two-factor authentication is for an effective cyber-security infrastructure.

By Kai Pfiester

7 minute read

March 04, 2015 | New Jersey Law Journal

Inside the Hacker Mind

Computer hackers follow a very specific methodology when it comes to attacking their targets; here are some insights into their process.

By Kai Pfiester

7 minute read

March 04, 2015 | New Jersey Law Journal

Inside the Hacker Mind

Computer hackers follow a very specific methodology when it comes to attacking their targets; here are some insights into their process.

By Kai Pfiester

7 minute read

October 14, 2014 | New Jersey Law Journal

Is Your Law Practice Safe From Hackers?

A cyber-security specialist explains how to protect your firm.

By Kai Pfiester

8 minute read