Access your Pro+ Content below.
Turn your computer incident response team into counter-threat operations
This article is part of the Information Security magazine issue of July/August 2011
It’s natural for members of a technology-centric industry to see technology as the solution to security problems. In a field dominated by engineers, one can often perceive engineering methods as the answer to threats that try to steal, manipulate, or degrade information resources. Unfortunately, threats do not behave like forces of nature. No equation can govern a threat’s behavior, and threats routinely innovate in order to evade and disrupt defensive measures. Security and IT managers are slowly realizing that technology-centric defense is too easily defeated by threats of all types. Some modern defensive tools and techniques are effective against a subset of threats, but security pros in the trenches consider the “self-defending network” concept to be marketing at best and counter-productive at worst. If technology and engineering aren’t the answer to security’s woes, then what is? To best counter targeted attacks, one must conduct counter-threat operations (CTOps). In other words, defenders must actively hunt intruders in ...
Access this PRO+ Content for Free!
Features in this issue
Big tech companies are scooping up security vendors with mixed results.
Fending off modern computer attacks requires actively hunting down intruders.
PCI group outlines challenges in achieving compliance with payment data on virtualized systems.
Security teams strive to gain visibility from a deluge of security information and put that data to work.
Columns in this issue
Be aware of changing technology and industry trends, and your job prospects will fall in line.
The idea that social media and other Web 2.0 technologies have vastly altered the threat landscape is plain wrong.
Large IT companies are buying up security vendors, but that doesn’t mean there won’t be plenty of room for innovative startups.