As the cyberthreat landscape multiplies, deception strategies as part of an overall cybersecurity toolkit are gaining momentum. Both governments and businesses can benefit from having a better understanding of deception techniques, including hacking back. Here’s how it works—and what to consider.
By Richard L. Villars, Vice President, Datacenter & Cloud, IDC
The most fundamental objective of any IT transformation effort must be enabling your entire organization to achieve maximum insight and return from all the data it generates, accesses, manages, and shares. The first step is to trust your data.
In the murky underground forums of the darknet, thousands of hackers trade secrets, discuss new forms of malware, and boast about recent attacks. Yet there are white hat hackers—the good guys—who have been able to find their way into these forums to spy on the spies.
Alex Tilley, a senior Counter Threat Unit researcher at Secureworks, recounts the true tale of a highly-organized cyberattack that started with a hacked bank in South Africa and ended with an impressive display of coordinated fraud.
The executive summary of Secureworks’ annual 2017 State of Cybercrime Report presents a high-level overview of the major cyber threats currently plaguing companies and individuals and rare insight into the behaviors and organizational structure of some of the most proficient criminal groups on the internet.
Government organizations, including the NGA, CIA, and FBI, are all actively using artificial intelligence to improve the data analysis process. Here’s a look at how these organizations are transforming operations using AI.