Threat Intelligence Evolution: Strategies for Safeguarding Government and Critical Infrastructure

In a recent discussion co-hosted by ATARC and Lookout, Federal experts addressed the evolving mobile threat landscape and strategies for safeguarding critical infrastructure. Increasingly sophisticated mobile device threat discoveries reveal advanced phishing and multi-factor authentication attacks, such as SIM swapping, employed by major APT and nation state actors. These tactics compromise numerous accounts, providing seamless access to sensitive data, with potential repercussions for national security through downstream supply chain attacks.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms and Conditions apply.

IMPORTANT NOTICE
Any information you supply is subject to our privacy policy. Access to this content is available to registered members at no cost. In order to provide you with this free service, Government Executive Media Group may share member registration information and other information you have provided to us with content sponsors.