In the early 1900s, philosopher George Santayana coined the immortal phrase, “Those who do not remember the past are condemned to repeat it.” The same maxim holds true in industrial cybersecurity. Every piece of malware, phishing attempt or distributed denial of service attack started somewhere. One way to improve your cybersecurity posture is to learn from past attacks. What did the attackers exploit, what was the ensuing damage and what did we learn from the incident?
This eBook, full of our popular Throwback Attacks, includes stories on how Chinese hackers stole plans for the F-35, how a cyberattack actually caused physical damage to a steel mill and why protecting critical assets is so important.
Learning Objectives:
- Chinese hackers steal plans for the F-35 fighter in a supply chain heist
- A cyberattack causes physical damage at a German steel mill
- RSA SecurID attack shows the importance of protecting critical assets
- Kevin Poulsen wins a Porsche (and hacks the U.S. government)
- And so much more in this 24-page eBook!
Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.