A
Adaptive Security Platform (ASP) 239
Advanced Persistent Threats (APTs) 7, 8, 11
anti-virus
growth 6
application programming interfaces (APIs) 74
applications
insecurity 40, 41
application whitelisting 214
types 215, 217
APT attack
advanced 8
persistent 9
threat 9
APT attacks 12, 13
artificial intelligence (AI) 284
attacks
downstream 56, 57
examples 50, 52
authentication methods
failure 41, 42, 44, 45
autonomous vehicle
security issues 59, 60, 62, 63
B
biometrics
as authentication program 274
brain wave-based authentication 274
Bring Your Own Device (BYOD) 25
C
campaigns
mapping, to matrices 146, 147, 149, 150, 151
changeme.py
reference link 265
Chief Information Officer (CIO) 182
Chief Information Security Officers (CISOs) 182
Chinese APT threat groups 10
Chinese manufacturing campaign 141, 143
Command and Control (C2)
modifying 152
comment...