Hacking operations are as vulnerable as a house of cards
Successful defense doesn’t mean stopping every attack
I just published a new post to my NetworkWorld blog, Hacking the Hackers.
To reach their goal, hackers must complete a series of actions in a company’s environment that are linked together. Fortunately for the defenders, carrying out each of these steps makes the attackers vulnerable and provides the good guys with a great opportunity to intervene.
Read the full post here.
SVP & CIO | CTO | Cybersecurity | People Leader | 2024 BostonCIO ORBIE Finalist | Startup Mentor & Advisor
9 年Great write-up, Lior. I couldn't agree more - the traditional IT approach and mindset are not to be used when there's the slightest trace of attack. A key tenant would be identifying those traces and developing a plan those analysts can easily follow.
"But the point is NOT to just GET BY, we want to live WELL, but our foremost efforts should be to HELP OTHERS LIVE WELL" (1 Cor. 10:24)
9 年Thank you Lior, that is a very helpful article.
Inventor | Browser Birds Engine
9 年Hacking to companies is easy, many workers download exe files, these files are controlled from remote servers, really awesome to put ads on the target machine but that exe can be used for other things also.