Marcus Kempe, director of operations support for the Massachusetts Water Resource Authority: “To us, cyberterrorism is a lower-level threat.” Information Warfare State-sponsored use of computers in military action Information Counter intelligence State-sponsored use of computers to gain knowledge on a foe Cyberterrorism Use of computers to cause terror, death, destruction or massive economic turmoil, often by a party not affiliated with any state Cyber Organized Crime Use of computers by a cartel-like group for the purpose of stealing or trafficking, usually money Information Vendettas Use of computers, usually by an insider or sanctioned by an insider, to sabotage an organization to create public embarrassment or to gain at the expense of that organization Cybercrime Use of computers to steal money, credit card data or personal information for use in extortion schemes or to gain notoriety as a hacker Cyberhooliganism Using computers for digital vandalism and low-level destruction, such as website defacement, virus propagation or “hacktivism”?that is, using those tools to get a message across Source: NIPC Related content feature Mastercard preps for the post-quantum cybersecurity threat A cryptographically relevant quantum computer will put everyday online transactions at risk. Mastercard is preparing for such an eventuality — today. By Poornima Apte Sep 22, 2023 6 mins CIO 100 Quantum Computing Data and Information Security feature 9 famous analytics and AI disasters Insights from data and machine learning algorithms can be invaluable, but mistakes can cost you reputation, revenue, or even lives. These high-profile analytics and AI blunders illustrate what can go wrong. By Thor Olavsrud Sep 22, 2023 13 mins Technology Industry Generative AI Machine Learning feature Top 15 data management platforms available today Data management platforms (DMPs) help organizations collect and manage data from a wide array of sources — and are becoming increasingly important for customer-centric sales and marketing campaigns. By Peter Wayner Sep 22, 2023 10 mins Marketing Software Data Management opinion Four questions for a casino InfoSec director By Beth Kormanik Sep 21, 2023 3 mins Media and Entertainment Industry Events Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe