For years, the systems and networks that run our businesses have been secured by the efforts of IT and security practitioners acting on their own. We continue to deploy the latest countermeasures, always trying to keep up with adversaries.
Criminal attackers, on the other hand, have shared information quite successfully to facilitate their exploits. Couple this with the “attacker’s