What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe Carson, chief security scientist at Thycotic, shares his thoughts on these questions.|What reconnaissance does a hacker conduct before an attack? What are the vulnerabilities they’re looking for? When are hackers most likely to strike? Joe Carson, chief security scientist at Thycotic, shares his thoughts on these questions.