Breach after breach, the same stories are told of gaps in security policy, misconfigured services, social engineering attacks, and inarguably the most difficult source of exploitation to manage: software vulnerabilities.
The task of collecting relevant information, organizing it, and piecing it together in a way that tells a story seems like an overwhelming and nearly impossible task. Yet, this is what intelligence analysts must do.
Foreign governments are continuously conducting covert operations in the U.S. to gather intelligence about public and private sector organizations. One of the best ways to collect information is through human intelligence, or HUMINT.
We don’t often think of certified public accountants (CPAs) as being stalwarts in corporate cybersecurity. But in today’s world everyone needs to be involved in keeping their systems safe from cyberattacks.