How many of these hacker personas are you dueling with in your organization?

John Trobough, CEO, Narus

October 29, 2014

1 Min Read

Almost every day, we hear about a new security breach, but who’s behind these attacks? Whether you’re dealing with the “professional mercenary,” the “cyber warrior” or the “malicious insider,” cyberhackers come in many shapes and sizes. They have access to a varying set of resources and utilize a broad range of attacks to steal valuable information or cause business disruption. As a result, it’s crucial that organizations understand the motivations, sophistication, and potential impacts of hackers.
 
As part of National Cyber Security Awareness Month, Narus, a cyber security data analytics company, developed an infographic to give organizations a better understanding of today’s hackers -- from the general types of hackers that enterprises often face to the types of attacks they’re most likely to deploy. No enterprise can guarantee 100% security across all parts of the business. There are too many gaps at the perimeter, and sadly hackers have all the time they need to work around defenses and exploit these gaps.

Who are the hacker personas you are battling? Let's chat about them in the comments.

Click here for a larger image.

About the Author(s)

John Trobough

CEO, Narus

John Trobough is the President and CEO of Narus. He brings more than 20 years of operations and international experience in the telecommunications and mobile software industries to the company. He is leading the Narus team to establish its cyber innovation presence in Silicon Valley and is dedicated to delivering the next generation of machine-learning and visualization software.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights