Stephen Lawton SC Media | Page 3 of 6
Stephen Lawton

Stephen Lawton

Most recent articles by Stephen Lawton

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Cyber espionage

Cyber espionage

Instead of spending billions of dollars to supply massive armies, today’s adversaries hire code-writers to create attacks that run autonomously for years with little or no human intervention.

Cyber threat intelligence

Cyber threat intelligence

In today’s environment, potential attackers have all the time they need to mount a sustained intrusion against a target company or government agency. While companies need to understand past attacks so they don’t happen again, it is crucial to look forward and protect data against future breaches. And, one way to achieve this is to put a greater emphasis on embedding security directly into enterprise data to stop outsider attacks, and to make data that is compromised unreadable and unusable. A number of other strategies are explored as well in this latest ebook from SC Magazine.

Next post in Research