
The Highlight Reel
In his examination, John Seabrook interviews lots of those in the know, and here are a few of the takeaways. Even with the scaled up FBI and Cyber Command and other national agencies at work, experts are seeing only the tip of the iceberg. Political hacktivists and other state-sanctioned actors are making off with the largest cache of intellectual property in human history. Attacks on US infrastructure are increasing, and many suspect that future wars will commence or conclude with concerted attacks of that nature. The evolution of technology from computers to mobile devices will only exacerbate the threats. Corporate IT staff and security teams can’t keep up with the demand, and morale is in decline.
And Your Point Is?
The threat is larger and more pervasive every day, so take two steps. First, read the piece in The New Yorker. Second, call ICS. We have a highlight reel, too. Let’s put it to work protecting your network and your organization.