recentpopularlog in

jerryking : symantec   3

Are you mentally prepared for a cyber attack?
JULY 5, 2017 | FT | by Madhumita Murgia.

“Cyber attacks are not benign. Even when no one suffers physical harm, the opportunity to cause anxiety and stress, instil fear and disrupt everyday life is immense,”.......journalists write about how companies and governments struggle to cope with the fallout from a cyber attack, but the longer-lasting impact on the human psyche has remained largely unexplored. Clearly, the anxiety prompted by cyber attacks is different from that associated with “traditional” acts of terrorism that cause deaths and injury to civilians. .... “Our analysis suggests that the psychological harm of cyber war can affect wellbeing nonetheless.” Identity theft, online threats of personal harm and the disclosure of confidential data such as medical records can cause significant distress........
........Samir Kapuria, a senior executive at Symantec, a global cyber-security company, is at the frontline of damage control, often helping clients after a cyber crime. He admitted that the corporate world was “in a state of urgency” when it came to dealing with the scale and virality of cyber attacks.

“The early 2000s was an era of mass cyber crime, when viruses like Stuxnet were released to disrupt with criminal intent. Today, with attacks like WannaCry and Petya, we are entering the era of intelligence,” says Kapuria, “moving from locks to surveillance to early detection.”
cyber_security  hackers  cyberthreats  malware  cyberattacks  psychology  panic  viruses  security_&_intelligence  Symantec  identity_theft  left_of_the_boom  surveillance  human_psyche  stressful  disaster_preparedness 
may 2018 by jerryking
Intelligence Start-Up Goes Behind Enemy Lines to Get Ahead of Hackers - The New York Times
By NICOLE PERLROTH SEPT. 13, 2015

iSight Partners, a company that provides intelligence about threats to computer security in much the same way military scouts provide intelligence about enemy troops....For the last eight years, iSight has been quietly assembling what may be the largest private team of experts in a nascent business called threat intelligence. Of the company’s 311 employees, 243 are so-called cyberintelligence professionals, a statistic that executives there say would rank iSight, if it were a government-run cyberintelligence agency, among the 10 largest in the world, though that statistic is impossible to verify given the secretive nature of these operations.

ISight analysts spend their days digging around the underground web, piecing together hackers’ intentions, targets and techniques to provide their clients with information like warnings of imminent attacks and the latest tools and techniques being used to break into computer networks.

The company’s focus is what John P. Watters, iSight’s chief executive, calls “left of boom,” which is military jargon for the moment before an explosive device detonates.... iSight's services fill a critical gap in the battle to get ahead of threats. Most security companies, like FireEye, Symantec, Palo Alto Networks and Intel’s security unit, focus on blocking or detecting intrusions as they occur or responding to attacks after the fact.

ISight goes straight to the enemy. Its analysts — many of them fluent in Russian, Mandarin, Portuguese or 21 other languages — infiltrate the underground, where they watch criminals putting their schemes together and selling their tools.

The analysts’ reports help clients — including 280 government agencies, as well as banks and credit-card, health care, retail and oil and gas companies — prioritize the most imminent and possibly destructive threats.

Security experts say the need for such intelligence has never been greater....the last thing an executive in charge of network security needs is more alerts, he said: “They don’t have time. They need human, actionable threat intelligence.”
cyber_security  security_&_intelligence  dark_web  hackers  intelligence_analysts  iSight  Symantec  threats  humint  spycraft  pre-emption  actionable_information  noise  threat_intelligence  left_of_the_boom  infiltration 
september 2015 by jerryking

Copy this bookmark:





to read