Here we go behind the ever-evolving, ever-increasing war to protect our privacy, our data and our humanity.
As the cyberthreat landscape multiplies, deception strategies as part of an overall cybersecurity toolkit are gaining momentum. Both governments and businesses can benefit from having a better understanding of deception techniques, including hacking back. Here’s how it works—and what to consider.
By Richard L. Villars, Vice President, Datacenter & Cloud, IDC
The most fundamental objective of any IT transformation effort must be enabling your entire organization to achieve maximum insight and return from all the data it generates, accesses, manages, and shares. The first step is to trust your data.
In the murky underground forums of the darknet, thousands of hackers trade secrets, discuss new forms of malware, and boast about recent attacks. Yet there are white hat hackers—the good guys—who have been able to find their way into these forums to spy on the spies.
In the current Cybersecurity landscape, it’s easy to feel outnumbered and outmaneuvered. As threats multiply and data breaches seem inevitable, …
Alex Tilley, a senior Counter Threat Unit researcher at Secureworks, recounts the true tale of a highly-organized cyberattack that started with a hacked bank in South Africa and ended with an impressive display of coordinated fraud.