{"id":32435,"date":"2016-12-06T12:49:23","date_gmt":"2016-12-06T20:49:23","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/2016\/12\/the-institute-for-critical-infrastructure-technology"},"modified":"2017-06-04T13:59:50","modified_gmt":"2017-06-04T20:59:50","slug":"the-institute-for-critical-infrastructure-technology","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2016\/12\/the-institute-for-critical-infrastructure-technology","title":{"rendered":"The Institute for Critical Infrastructure Technology"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/the-institute-for-critical-infrastructure-technology.jpg\"><\/a><\/p>\n<p>New report: rise of the machines: the dyn attack was just A practice run. <\/p>\n<p>As the adversarial threat landscape continues to hyper-evolve, America\u2019s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted. The Mirai IoT botnet has inspired a renaissance in adversarial interest in DDoS botnet innovation based on the lack of fundamental security-by-design in the Internet and in IoT devices, and based on the lack of basic cybersecurity and cyber-hygiene best practices by Internet users.<\/p>\n<p><a href=\"http:\/\/icitech.org\/icit-publication-the-rise-of-the-machines-the-dyn-attack-was-just-a-practice-run\/\">http:\/\/icitech.org\/icit-publication-the-rise-of-the-machines\u2026ctice-run\/<\/a><\/p>\n<p><!-- Link: <a href=\"http:\/\/icitech.org\/icit-publication-the-rise-of-the-machines-the-dyn-attack-was-just-a-practice-run\/\">http:\/\/icitech.org\/icit-publication-the-rise-of-the-machines...ctice-run\/<\/a> --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New report: rise of the machines: the dyn attack was just A practice run. As the adversarial threat landscape continues to hyper-evolve, America\u2019s treasure troves of public and private data, IP, and critical infrastructure continues to be pilfered, annihilated, and disrupted. The Mirai IoT botnet has inspired a renaissance in adversarial interest in DDoS botnet [\u2026]<\/p>\n","protected":false},"author":394,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-32435","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/32435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/394"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=32435"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/32435\/revisions"}],"predecessor-version":[{"id":65647,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/32435\/revisions\/65647"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=32435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=32435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=32435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}