NOT FOR REPRINT
Page Printed from: propertycasualty360.com/author/profile/davis-hake/
Sign In To follow
Understanding why threat actors do what they do helps illuminate how they will behave in the future.
{ "author": { "name": "Davis Hake", "webUrl": "/author/profile/davis-hake/", "description": "", "imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g", "estimate": 1, "social": [], "articles": [ { "uri": "/2024/01/02/10-tips-for-cyber-resilience-in-2024/", "title": "10 tips for cyber resilience in 2024", "byline": "Davis Hake", "kicker": "Analysis", "prettyDate": "January 02, 2024", "timeToRead": "11 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2024/01/Plant-Growth.jpeg", "width": "767", "height": "633" }, "authors": [ { "webUrl": "/author/profile/davis-hake/", "name": "Davis Hake" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "summary": "Understanding why threat actors do what they do helps illuminate how they will behave in the future.", "body": null } ] } }