The motivation for hacking has gone from exposing a targets weaknesses to exposing or stealing sensitive data and disrupting critical business processes.
DebugScreen: mobile
{
"author": {
"name": "Paul King",
"webUrl": "/author/profile/paul-king/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 4,
"social": [],
"articles": [
{
"uri": "/2017/12/13/usi-cybersecurity-study-highlights-growing-threats-and-shifting-risks/",
"title": "USI cybersecurity study highlights growing threats and shifting risks",
"byline": "Dena Cusick, Paul King",
"kicker": "News",
"prettyDate": "December 13, 2017",
"timeToRead": "5 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/dena-cusick-paul-king/",
"name": "Dena Cusick, Paul King"
}
],
"kickerNode": [
{
"uri": "/news/",
"sectionName": "News"
}
],
"summary": "A new cybersecurity and data privacy study from USI highlights the top shifting risks and concerns among small and large U.S. businesses.",
"body": null
},
{
"uri": "/2015/12/10/how-industrial-companies-can-manage-cyber-threats/",
"title": "How industrial companies can manage cyber threats",
"byline": "Paul King",
"kicker": "Market Insights",
"prettyDate": "December 10, 2015",
"timeToRead": "7 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/paul-king/",
"name": "Paul King"
}
],
"kickerNode": [
{
"uri": "/market-insights/",
"sectionName": "Market Insights"
}
],
"summary": "Here are the four most significant cyber events facing industrial companies.",
"body": null
},
{
"uri": "/2015/12/10/how-industrial-companies-can-manage-cyber-threats/",
"title": "How industrial companies can manage cyber threats",
"byline": " Paul King ",
"kicker": "Market Insights",
"prettyDate": "December 10, 2015",
"timeToRead": "6 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/paul-king/",
"name": "Paul King"
}
],
"kickerNode": [
{
"uri": "/market-insights/",
"sectionName": "Market Insights"
}
],
"summary": "Here are the four most significant cyber events facing industrial companies.",
"body": null
},
{
"uri": "/2015/07/20/4-common-but-dangerous-cyber-threats-and-steps-to/",
"title": "4 common but dangerous cyber threats and steps to address them",
"byline": "Paul King",
"kicker": "News",
"prettyDate": "July 20, 2015",
"timeToRead": "7 minute",
"image": {
"uri": "",
"width": "",
"height": ""
},
"authors": [
{
"webUrl": "/author/profile/paul-king/",
"name": "Paul King"
}
],
"kickerNode": [
{
"uri": "/news/",
"sectionName": "News"
}
],
"summary": "The motivation for hacking has gone from exposing a targets weaknesses to exposing or stealing sensitive data and disrupting critical business processes.",
"body": null
}
]
}
}