The Latest in IT Security

Attacker attribution is hard, but sometimes easier than you think

Attacker attribution is hard, but sometimes easier than you think


The recent controversy over Hack Back, not to be confused with Back-Hack, was largely fueled by proposed but failed legislation in the State of Georgia. The spate of articles and opinion pieces arguing against the emotionally satisfying, but dangerous strategy largely hung their shields on the impossibility of getting “attribution right.”

It’s true that attackers are very good at hiding their tracks and stepping over stones making it near impossible to reach their actual source location. But there are methods and technologies that can help reveal these adversaries more accurately. I’ve personally been involved in determining attribution and holding hackers accountable based on decades of my own research.

Read More

Leave a reply


FRIDAY, JULY 19, 2019

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments

Social Networks