{"id":2120,"date":"2019-12-12T19:50:46","date_gmt":"2019-12-12T18:50:46","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/"},"modified":"2019-12-13T12:50:17","modified_gmt":"2019-12-13T11:50:17","slug":"cybersecurity-is-as-much-about-social-engineering-as-bugs","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/","title":{"rendered":"Cybersecurity is as much about social engineering as bugs"},"content":{"rendered":"<p>Not a day passes without news of cybersecurity &#8211; a ransomware attack, data theft, DDos attack, a research identified vulnerability, \u00a0or serious hardware flaw. At this year&#x27;s <a   href=\"https:\/\/events.codemotion.com\/conferences\/amsterdam\/2019\/\">Codemotion Amsterdam,<\/a><a   href=\"https:\/\/events.codemotion.com\/conferences\/amsterdam\/2019\/agenda\/#conference-list\">\u00a0Eward Driehuis<\/a>, (former research chief at SecureLink and SVP Strategy at Cybersprint) , took us on a <em>hugely entertaining<\/em> journey through the cyber threat landscape of the last few years including the responsibility of devs, and why social engineering matters.\u00a0<\/p>\n<p>He explained his role:<\/p>\n<p>&quot;I research threats in\u00a0a company that actually watches over a\u00a0lot of European companies right so we are like the watch guards we look over\u00a0their shoulders everything that happens,\u00a0and whenever we see something happening\u00a0that&#x27;s out of the ordinary, we&#x27;re gonna\u00a0either kick the bad guys out or\u00a0we&#x27;re gonna do something else to make\u00a0sure that this company isn&#x27;t compromised.&quot;<\/p>\n<h2 id=\"d41ik\"><strong>A short history of cyber crime:\u00a0Banking is an early target but also a saviour<\/strong><\/h2>\n<p>From 2006 2010 fraud was a fairly old school: &quot;manipulating the post fields in HTTP requests: if you post a transaction to the server you can just adjust the beneficiary accounts. This is not about bugs, but &quot;the laziness of the banking customers who will click that link or you&#x27;re just plain phishing them, \u00a0you&#x27;re calling them up and saying &#x27;yeah, we&#x27;re at the bank and we need to double check a code&#x27;.<\/p>\n<p>Eward asserts that &quot;the only reason why the banks started cybersecurity as an industry is that they were closing down brick-and-mortar offices by the numbers and replacing them all for online channels so they wanted to maintain the confidence in these online channels.\u00a0The banks weren\u2019t being hacked, it was the customers.&quot;\u00a0<\/p>\n<h2 id=\"86hf2\">Enter the nation-states\u00a0<\/h2>\n<p>Eward discussed the notorious NotPetya and Wannacry attacks of 2015 noting \u00a0<\/p>\n<blockquote><p>&quot;What many people missed about these two attacks is that not one single victim of both attacks that ever paid the ransom to the criminals got their files back, so maybe they weren&#x27;t criminals&#8230;&quot;<\/p><\/blockquote>\n<p>He noted that it was only recently that the security sector attributed WannaCry to North Korean and Russia as the origins of NotPetya. Given the lack of payments, he suggested they leveraged the attacks for destructive purposes rather than financial remuneration and as an opportunity for flexing muscle as to their abilities to cause havoc. <\/p>\n<h2 id=\"131af\"><strong>Social engineering requires zero bugs<\/strong><\/h2>\n<figure class=\"image regular \"><picture style=\"\"><source srcset=\"https:\/\/codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/SCREENSHOT2019-12-12AT19_32_04_4df436d8b95e5963f6825d688831aa82_800.jpeg 1x, https:\/\/images.storychief.com\/account_16344\/SCREENSHOT2019-12-12AT19_32_04_4df436d8b95e5963f6825d688831aa82_1600.jpeg 2x\" media=\"(max-width: 768px)\" \/><source srcset=\"https:\/\/codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/SCREENSHOT2019-12-12AT19_32_04_4df436d8b95e5963f6825d688831aa82_800.jpeg 1x, https:\/\/images.storychief.com\/account_16344\/SCREENSHOT2019-12-12AT19_32_04_4df436d8b95e5963f6825d688831aa82_1600.jpeg 2x\" media=\"(min-width: 769px)\" \/><img decoding=\"async\" style=\"\" alt=\"cybercriminals are still active in the summer holidays \" src=\"https:\/\/codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/SCREENSHOT2019-12-12AT19_32_04_4df436d8b95e5963f6825d688831aa82_800.jpeg\" \/><\/picture><figcaption><strong>Cybercriminals and spies use social engineering for easy access even in Europe&#x27;s holiday months<\/strong><\/figcaption><\/figure>\n<p>Bugs are not the cause of cybercrime, humans are: &quot;\u00a0You just need to convince someone to do something stupid.&quot; Eward detail the power of lateral movement where state-sponsored espionage groups create specific malware not recognized by endpoint security meaning :<\/p>\n<blockquote><p>&quot;You have now a foothold in a company network \u00a0and then you&#x27;re gonna look for intellectual property such as marketing plans and big database that can be stolen and leveraged for economic gain.&quot;<\/p><\/blockquote>\n<h2 id=\"85mgl\"><strong>Other findings\u00a0<\/strong><\/h2>\n<figure class=\"image regular \"><picture style=\"\"><source srcset=\"https:\/\/codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/SCREENSHOT2019-12-12AT19_32_09_cd61ad336220604deb5ee458d9c069d7_800.jpeg 1x, https:\/\/images.storychief.com\/account_16344\/SCREENSHOT2019-12-12AT19_32_09_cd61ad336220604deb5ee458d9c069d7_1600.jpeg 2x\" media=\"(max-width: 768px)\" \/><source srcset=\"https:\/\/codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/SCREENSHOT2019-12-12AT19_32_09_cd61ad336220604deb5ee458d9c069d7_800.jpeg 1x, https:\/\/images.storychief.com\/account_16344\/SCREENSHOT2019-12-12AT19_32_09_cd61ad336220604deb5ee458d9c069d7_1600.jpeg 2x\" media=\"(min-width: 769px)\" \/><img decoding=\"async\" style=\"\" alt=\"small targets easily fall prey to attacks and social engineering\" src=\"https:\/\/codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/SCREENSHOT2019-12-12AT19_32_09_cd61ad336220604deb5ee458d9c069d7_800.jpeg\" \/><\/picture><figcaption><strong>Small organisations are easy targets <\/strong><\/figcaption><\/figure>\n<ul>\n<li>Small companies (under 1000 employees) are hit 6 times harder than large organisations, and that\u00a0cybercriminals preference cryptojacking over ransomware by a factor of 2 <\/li>\n<li>Veteran criminals such can wreak havoc breaking into a company&#x27;s invoice template <\/li>\n<li>A legion of Gentleman spies are growing who &quot;Don&#x27;t target their target, they target someone else: \u00a0their suppliers, an IT provider, or a service provider\u00a0who they target through their VPNs&#8230;&quot;<\/li>\n<li>Stupidity is to blame for PWNing.\u00a0<\/li>\n<\/ul>\n<p>Ultimately Eward believes that:<\/p>\n<p> &quot;In maybe 10, 20 years we will be more secure than ever, but in the meantime, the system is weak and full of errors and\u00a0of\u00a0all of the attacks that we&#x27;re looking at,\u00a0I would say 99% attacked the system rather than the software and that&#x27;s the problem.&quot; It looks like social engineering will remain a persist challenge to the efforts of cybersecurity professionals as well as those building platforms and programs. <\/p>\n<figure class=\"video regular \">\n<div class=\"embed-container\">\n<div style=\"max-width: 100%; position: relative; padding-top: 56.25%;\"><iframe loading=\"lazy\" width=\"480\" height=\"270\" src=\"https:\/\/www.youtube.com\/embed\/F1aYcVvkDjw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\" style=\"position: absolute; top: 0px; left: 0px; width: 100%; height: 100%;\"><\/iframe><\/div>\n<\/div>\n<\/figure>\n<p><em>You can take a closer look at the <a   href=\"https:\/\/www.slideshare.net\/Codemotion\/eward-driehuis-what-we-learned-from-20000-attacks-codemotion-amsterdam-2019?qid=d8e885e6-3977-441f-b665-4167564a2594&#038;v=&#038;b=&#038;from_search=1\">slides<\/a> from this presentation over at Codemotion&#x27;s Slideshare. <\/em><\/p>\n<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: \"https:\/\/codemotion.storychief.io\/cybersecurity-is-as-much-about-social-engineering-as-bugs?id=140028349&type=2\",title: \"Cybersecurity is as much about social engineering as bugs\",id: \"66543c6c-96d5-4792-a44b-49339654b7a1\"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = \"https:\/\/d37oebn0w9ir6a.cloudfront.net\/scripts\/v0\/strchf.js\";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    <\/script><!-- End strchf script --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At this year&#8217;s Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a  journey through the cyber threat landscape<\/p>\n","protected":false},"author":85,"featured_media":2121,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[],"tags":[77,38],"collections":[],"class_list":{"0":"post-2120","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"tag-codemotion-amsterdam","8":"tag-security-manager","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity is as much about social engineering as bugs<\/title>\n<meta name=\"description\" content=\"At this year&#039;s Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a journey through the cyber threat landscape\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity is as much about social engineering as bugs\" \/>\n<meta property=\"og:description\" content=\"At this year&#039;s Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a journey through the cyber threat landscape\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-12T18:50:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-13T11:50:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"499\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cate Lawrence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cate Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/\"},\"author\":{\"name\":\"Cate Lawrence\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/df32323fd62dc47fa8892426677a2cc1\"},\"headline\":\"Cybersecurity is as much about social engineering as bugs\",\"datePublished\":\"2019-12-12T18:50:46+00:00\",\"dateModified\":\"2019-12-13T11:50:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/\"},\"wordCount\":695,\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg\",\"keywords\":[\"Codemotion Amsterdam\",\"Security Manager\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/\",\"name\":\"Cybersecurity is as much about social engineering as bugs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg\",\"datePublished\":\"2019-12-12T18:50:46+00:00\",\"dateModified\":\"2019-12-13T11:50:17+00:00\",\"description\":\"At this year's Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a journey through the cyber threat landscape\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg\",\"width\":1024,\"height\":499,\"caption\":\"Cybersecurity is as much about social engineering as bugs\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/dev-hub\\\/security-manager\\\/cybersecurity-is-as-much-about-social-engineering-as-bugs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity is as much about social engineering as bugs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Codemotion.Italy\\\/\",\"https:\\\/\\\/x.com\\\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/df32323fd62dc47fa8892426677a2cc1\",\"name\":\"Cate Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g\",\"caption\":\"Cate Lawrence\"},\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/author\\\/cate-lawrence\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity is as much about social engineering as bugs","description":"At this year's Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a journey through the cyber threat landscape","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity is as much about social engineering as bugs","og_description":"At this year's Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a journey through the cyber threat landscape","og_url":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2019-12-12T18:50:46+00:00","article_modified_time":"2019-12-13T11:50:17+00:00","og_image":[{"width":1024,"height":499,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg","type":"image\/jpeg"}],"author":"Cate Lawrence","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Cate Lawrence","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/"},"author":{"name":"Cate Lawrence","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1"},"headline":"Cybersecurity is as much about social engineering as bugs","datePublished":"2019-12-12T18:50:46+00:00","dateModified":"2019-12-13T11:50:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/"},"wordCount":695,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg","keywords":["Codemotion Amsterdam","Security Manager"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/","url":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/","name":"Cybersecurity is as much about social engineering as bugs","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg","datePublished":"2019-12-12T18:50:46+00:00","dateModified":"2019-12-13T11:50:17+00:00","description":"At this year's Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a journey through the cyber threat landscape","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg","width":1024,"height":499,"caption":"Cybersecurity is as much about social engineering as bugs"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/cybersecurity-is-as-much-about-social-engineering-as-bugs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity is as much about social engineering as bugs"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/df32323fd62dc47fa8892426677a2cc1","name":"Cate Lawrence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2dbf9850a6e06e402d71247f79a76d6a5adad553ed6aab558a29a4107e5e83b1?s=96&d=mm&r=g","caption":"Cate Lawrence"},"url":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-600x499.jpg","author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg",1024,499,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-300x146.jpg",300,146,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-768x374.jpg",768,374,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg",1024,499,false],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg",1024,499,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg",1024,499,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000.jpg",100,49,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-896x499.jpg",896,499,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/41397205725_44b976f7a8_b_02d0b76ee1210f247f2b1fc471d1aa13_2000-600x499.jpg",600,499,true]},"uagb_author_info":{"display_name":"Cate Lawrence","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/cate-lawrence\/"},"uagb_comment_info":0,"uagb_excerpt":"At this year's Codemotion Amsterdam, Eward Driehuis, SVP of strategy at Cybersprint, took us on a journey through the cyber threat landscape","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/2120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=2120"}],"version-history":[{"count":3,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/2120\/revisions"}],"predecessor-version":[{"id":2128,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/2120\/revisions\/2128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/2121"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=2120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=2120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=2120"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=2120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}