{"id":945,"date":"2011-06-28T00:00:00","date_gmt":"2011-06-28T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2011\/06\/28\/cyber-attacks-are-escalating\/"},"modified":"2021-12-30T11:38:27","modified_gmt":"2021-12-30T11:38:27","slug":"cyber-attacks-are-escalating","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2011\/06\/28\/cyber-attacks-are-escalating\/","title":{"rendered":"Cyber attacks are escalating"},"content":{"rendered":"<p>Today, that highway is starting to resemble the route Mad Max traveled in The Road Warrior.   Hardly a week goes by without seeing news reports about another corporation being sabotaged by hackers.  This month on The Digital Future, Strategic News Service publisher Mark Anderson looks at the huge increase in Advanced Persistent Threats: efforts by nation-states to steal information and technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many of the victims are in industries that are strategically important to China, and\/or are engaged in business with China.   But these charges can be hard to prove, and China has &#8220;plausible deniability&#8221; on its side.<\/p>\n<p>The world&#8217;s corporations are under attack, and Mark says they need to take strict measures to protect their &#8220;crown jewels&#8221; of intellectual property.   They need to take the same steps that the Pentagon takes to protect its secrets:<\/p>\n<p>Mark says secrecy plays right into the hands of the attackers, and corporations need to speak out and become part of the solution to stopping these attacks.<\/p>\n<p>http:\/\/www.kplu.org\/post\/cyber-attacks-are-escalating<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-945","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=945"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/945\/revisions"}],"predecessor-version":[{"id":3432,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/945\/revisions\/3432"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}