This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: PFP5XtCTv-q5UHsZ-Nv_jIArZJEQQhtP1FEQdoZlAc0
Cover

How Hackers use Online Job Postings to Infiltrate Organizations

Written by @michael-piccalo | Published on 2020/9/18

TL;DR
Michael Piccalo is the Director of OT/ICS Systems Engineering at Forescout Technologies. There are more than 4 million unfilled positions across businesses of all sizes and industries, according to a 2019 (ISC)2 study. The more information available about your company, the employees, the plant systems, available positions and locations, etc., the easier it is to craft an attack with a higher probability of success. Organizations are often not aware of what sensitive or revealing information is freely available with just a simple search.

[story continues]


Written by
@michael-piccalo
Michael Piccalo is the Director of OT/ICS Systems Engineering at Forescout Technologies.

Topics and
tags
cybersecurity|cybersecurity-jobs|cybersecurity-skills|critical-infrastructure-secure|operational-technology|critical-infrastructure|insider-threats|hackernoon-top-story
This story on HackerNoon has a decentralized backup on Sia.
Transaction ID: PFP5XtCTv-q5UHsZ-Nv_jIArZJEQQhtP1FEQdoZlAc0