From the Fall 2016 Issue

Cybersecurity for Wireless Devices and Networks

Philip Green
President/CEO | INNOPLEX, LLC

In the cybersecurity environment, the role a cyber-attacker plays in a given scenario is much easier to execute than that of a defender. This assertion is a basic tenet of cybersecurity operations that most security professionals around the world acknowledge. In general terms, an attacker needs to find only one weakness or intrusion opportunity, while defenders must typically attempt to harden the entirety of their cyber architectures against all manner of intrusions. Attackers act without rules; they may take unanticipated routes, abuse trust, act stealthily, or be destructive. The defender, on the other hand, must keep . . .

Leave a Comment