GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Threat Intelligence Evolution: Strategies for Safeguarding Government and Critical Infrastructure

Threats to IT infrastructure and individuals are becoming more sophisticated and harder to identify, especially on mobile devices.

Research shows major advanced persistent threat (APT) and nation state actors are now using advanced phishing techniques and multi-factor authentication (MFA) attacks including SIM swapping approaches through mobile to compromise thousands of accounts. Doing so enables threat actors to seamlessly access sensitive data, which can trigger downstream supply chain attacks and have major national security implications.

  • Author(s):
  • ATARC
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Threat Intelligence Evolution: Strategies for Safeguarding Government and Critical Infrastructure
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:ATARC
Published:February 21, 2024
License:Copyrighted
Copyright:© ATARC

Featured Content

Contact Publisher

Claim Content