Identifying and Anticipating Disruptive Strategies in Cybercriminal Market Segments
This article is part of the Criminal Information System Management series, cybercriminal strategic positionning section. Key Takeaways Kim & Mauborgne's...
CTO at XRATOR
- - -
I am an Entrepreneur and a Telecommunication Engineer with a post-graduate degree in Criminology. Before cofounding XRATOR, I was a cyber-threat intelligence researcher, analyst and investigator for large multi-national companies and the antivirus industry.
Outside my business activities, I like to share my knowledge by teaching threat intelligence, cyber-risk management and cybersecurity leadership in several French universities and Business Schools.
This article is part of the Criminal Information System Management series, cybercriminal strategic positionning section. Key Takeaways Kim & Mauborgne's...
This article is part of the Criminal Information System Management series, cybercriminal strategic positionning section. Key Takeaways The traditional APT/cybercrime...
This article is part of the Criminal Information System Management series, cybercriminal strategic positionning section. Key Takeaways Understanding criminal organizations'...
This article is part of the Criminal Information System Management series, cybercriminal strategic positionning section. Key Takeaways Porter's Five Forces...
Recently, observers of the cybercrime landscape have been puzzled by dissonant patterns that only make sense when viewed through the...
When CloudSEK researchers revealed that over 18,000 wannabe hackers had been compromised through a trojanized malware builder, the cybersecurity community's...
False flag operations in cyberspace are more than funky tactical attempts at simplistic deception; they are calculated moves within a...
Threat and vulnerability management has become a critical task for organizations of all sizes. Traditional methods of prioritizing vulnerabilities based...
Cybercrime has evolved into a sophisticated industry, with botnets playing a critical role in facilitating various illegal activities. These networks...
Agenda 1. Introduction 2. LockBit Business Model Breakdown 3. Analyzing the Affiliate Network Metrics 4. Geographic Insights and Market Analysis...
XRATOR® – copyright 2020-2021
© 2018 JNews by Jegtheme.