Cyberespionage attacks have been going on for years, although they haven't received much public disclosure or attention. But, an attack on Google and several other large companies early in 2010 changed that for the American multinational corporate stage. The so-called Aurora breach brought attention to the use of computers to invade domains anywhere in the world - to gather intellectual property, to jam up network operations, to siphon off financial assets, or any number of other misdeeds. And these efforts are growing. With the low-cost of computing resources, nearly anyone with some technical sense and a will to do harm can participate. To thwart such intrusions, proper risk management and layered security are key factors cited by some experts in this latest eBook from SC Magazine.