One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 1394828
Date de publication 2019-10-10 13:00:00 (vue: 2019-10-10 16:00:28)
Titre Love your enemies before you destroy them
Texte man walking in front of graffiti that says good Photo by Volkan Olmez on Unsplash “In the moment when I truly understand my enemy, understand him well enough to defeat him, then in that very moment I also love him. I think it’s impossible to really understand somebody, what they want, what they believe, and not love them the way they love themselves. And then, in that very moment when I love them.... I destroy them.” Orson Scott Card, Enders Game The cutting edge of cybersecurity is moving away from a reactive defense. Instead of analysts waiting for a threat to happen, they are proactively searching out attackers in their environment. Attackers are dynamic. They are always changing and improving their capabilities, which means that defenders needs to lean in and adapt even faster to keep up. Proactive defense is about predicting, understanding, and preventing as many moves as possible that an attacker could make against you. You have to stay a step ahead of the enemy and lure them into a trap of your own. In the cybersecurity space, this is why we red team. A group of red teamers takes on the characteristics of an adversary to challenge an organization to improve its defenses. They eat, sleep, and breathe adversary behavior ...legally. Red teaming is a well-regarded and crucial part of defense in cybersecurity. It has its place and it makes an impact, but it is solely targeted at improving defenses. What if we took this idea of understanding the enemy one step further, outside of defense? Anonymous, WIkiLeaks, and nation-state threat actors use open-source intelligence (OSINT) and espionage campaigns to drill down into the lives of targeted individuals. They use hacker techniques, tactics, and procedures to aggressively target individuals as a means of control. Once they have access to this information, they can do any number of bad things with it, from sabotage to assassination. But what if we took these adversary methods of OSINT and used them for the greater good? Must these techniques be used solely for evil? As a society, we have gone from outright shunning of hacker culture, stereotyping hackers as hoodie-wearing teenagers in the basement, to the beginnings of acceptance and appreciation of hackers. We have started to recognize that many hackers are curious individuals that want to try something new. They are the puzzle solvers of the Internet age. Moreover, they are necessary for the cyber-resilience of the technology industry. Much like being a germaphobe puts you at more risk of becoming ill, not appreciating and adopting a hacker mindset results in weakly secured systems. As part of the revolution of acceptance ar
Envoyé Oui
Condensat “in about accept acceptance access active activity actors actual adapt adopting adversarial adversary against age aggressively ahead also always analysts anonymous any apply appreciating appreciation are around assassination associated attack attacker attackers away bad basement becoming before beginnings behavior being believe better between breaks breathe bring but by volkan campaigns can capabilities card case cases challenge changing characteristics children commonly control coordinated could cropping crucial crumbling culture curious cutting cyber cybersecurity defeat defend defenders defending defense defenses destroy destroying dominated down drill dynamic eat edge enders enemies enemy enough enter environment espionage even evil example experts fabian families far faster field find from further game germaphobe get gone good greater group groups guys hacker hackers happen has hat have head help helping him home hoodie how however idea ill impact impossible improve improving individual individuals industry information innovation instances instead intelligence internet it’s its just keep labs lean legal legally liaises like little lives long love lure make makes many means methods mindset missing mold moment more moreover moves moving much must nation near necessary needs new non not nowhere number olmez on unsplash once one open organization orson osint out outright outside own parents part persons photo place police possible practices predicting preventing privacy proactive proactively procedures profit profits puts puzzle ransomware reactive really recognize red regarded relatives renowned resilience resilient results revolution risk sabotage safe scott searching secured security see seen shoring should shunning skills sleep society solely solvers somebody something source space start started state stay step stereotyping systems tactics takes taking talents target targeted team teamers teaming techniques technology teenagers them themselves then these things think those threat today took towards trace trap truly try turn understand understanding use used using very victims waiting want way weakly wearing well what when where which white why wikileaks will world your
Tags Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: