IPSE'S AUTHORS LAST 24h
  • No New Authors inserted in the last 24 hours
Check all the Authors in the last 24h
IPSEs IN THE LAST 24H
  • Emmanuel Macron
    Emmanuel Macron “If the Russians were to break through the front lines, if there were a Ukrainian request [of sending ground troops to Ukraine], which is not the case today, we would legitimately have to ask ourselves this question.” 5 hours ago
  • David Cameron
    David Cameron “We will give three billion pounds every year for as long as is necessary. We've just really emptied all we can in terms of giving equipment. The aid package was the largest from the UK so far. Some of that (equipment) is actually arriving in Ukraine today, while I'm here. Ukraine has a right to use the weapons provided by London to strike targets inside Russia, and that it was up to Kyiv whether to do so. Ukraine has that right. Just as Russia is striking inside Ukraine, you can quite understand why Ukraine feels the need to make sure it's defending itself.” 5 hours ago
View All IPSEs inserted in the Last 24h
NEW CONTEXTS IN THE LAST 24H
  • No New Contexts inserted in the last 24 hours
View All New Contexts inserted in the last 24h

Guarding against cyberattacks - Strategy

Page with all the IPSEs stored in the archive related to the Context Guarding against cyberattacks - Strategy.
The IPSEs are presented in chronological order based on when the IPSEs have been pronounced.

“We need to reduce the blast radius. We need to manage the battlefield. Cyberattacks on chip manufacturers are on the rise. There's a lot that can be done ... to not only prevent attacks but to mitigate them as they happen. Companies can limit the blast radius by setting up choke points throughout the network that isolate the spread of the attack and protect the core assets. For example, take semiconductors, we don't mind as much if someone reads someone's emails. What we want is to stop them gaining access to the assets that produce the wafers. This is done by anticipating the hacker's next move. We want to identify them, hunt them, and eradicate them without impacting operations. We can actually lure the threat actor to waste time in a different network segment where we can do no harm while we shore up defenses around the core assets.”

author
Vice President of Enterprise Security at Sygnia, a Tel Aviv-based cybersecurity firm
Read More
May
MonTueWedThuFriSatSun
0102030405
06070809101112
13141516171819
20212223242526
2728293031
IPSEs by City
IPSEs by Author
IPSEs by Country
arrow