December 15, 2023 | New Jersey Law Journal
The Five Paths of Cyberattacks: What To Know and How To Be ReadyThere are essentially only five paths an attacker can take while performing a cyberattack on a target, and the MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a knowledge base that describes the actions and behaviors of cyber-attackers across various stages of the cyberattack lifecycle.
By Kai Pfiester
8 minute read
November 17, 2023 | New Jersey Law Journal
Cybersecurity—A Journey, Not A DestinationCybersecurity is a journey, not a destination. We cannot purchase a product or service that magically solves all our problems involving information security. Certainly, we can mitigate risk. But we can never eliminate it.
By Kai Pfiester
7 minute read
March 31, 2016 | New Jersey Law Journal
A Few Tips to Bolster Your Firm's Cyber-SecurityFive tips for preventing a cyber-attack on your law firm.
By Kai Pfiester
13 minute read
December 09, 2015 | New Jersey Law Journal
Social Engineering: The Attack Your Firewall Can't StopSocial engineering—a nontechnical means of intrusion cyber criminals use that relies mostly on human interaction—is one of the greatest threats that organizations encounter today.
By Kai Pfiester
7 minute read
December 09, 2015 | New Jersey Law Journal
Social Engineering: The Attack Your Firewall Can't StopSocial engineering—a nontechnical means of intrusion cyber criminals use that relies mostly on human interaction—is one of the greatest threats that organizations encounter today.
By Kai Pfiester
7 minute read
August 12, 2015 | New Jersey Law Journal
Stop Hackers With Two-Factor AuthenticationAn explanation of how crucial two-factor authentication is for an effective cyber-security infrastructure.
By Kai Pfiester
7 minute read
August 12, 2015 | New Jersey Law Journal
Stop Hackers With Two-Factor AuthenticationAn explanation of how crucial two-factor authentication is for an effective cyber-security infrastructure.
By Kai Pfiester
7 minute read
March 04, 2015 | New Jersey Law Journal
Inside the Hacker MindComputer hackers follow a very specific methodology when it comes to attacking their targets; here are some insights into their process.
By Kai Pfiester
7 minute read
March 04, 2015 | New Jersey Law Journal
Inside the Hacker MindComputer hackers follow a very specific methodology when it comes to attacking their targets; here are some insights into their process.
By Kai Pfiester
7 minute read
October 14, 2014 | New Jersey Law Journal
Is Your Law Practice Safe From Hackers?A cyber-security specialist explains how to protect your firm.
By Kai Pfiester
8 minute read
Trending Stories