March 12, 2024, 8:32 p.m. | Ian Tarasevitsch and Mike Saxton

C4ISRNet www.c4isrnet.com

Sloppy setups, including the use of outdated encryption methods, make attacker infrastructures vulnerable to defenders looking for countermeasures.

adversaries attacker countermeasures defenders defense encryption engagement nation persistent state vulnerable

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States

Information Assurance Security Specialist (IASS)

@ OBXtek Inc. | United States

Cyber Security Technology Analyst

@ Airbus | Bengaluru (Airbus)

Vice President, Cyber Operations Engineer

@ BlackRock | LO9-London - Drapers Gardens