Understanding attacker resources

When classifying and identifying an attacker, we need to consider their motivations, as well as what resources they need or have to make a successful attack.  Let me share an example: Several years ago Sony was hacked by a North Korean group, the Guardians of Peace, because Sony was going to release a movie (the…

Continue Reading