Access "Leverage Google Attacks to Improve Cybersecurity"
This article is part of the January/February 2010 issue of Filling the data protection gap
For years, we've heard expert types tell us about targeted attacks against business units or even specific individuals inside an organization. We hear about reconnaisance done against these targets with hackers scouring messageboards, discussion forums, LinkedIn, Facebook and other places where people dump all the minutae about their lives. The experts' anecdotes are rich in speculation about the profiles organized attackers build against companies in order to craft their malicious messages and lure targets into their traps. But despite all this cloak-and-dagger color from the experts, there had yet to be a high-profile example of such an attack made public until Google decided to share details about its intimate experiences with the Chinese. It's no secret that China, whether through a state-sponsored operation or run by a criminal element there, has been stealing U.S. corporate, government and military secrets for a long time. Hacking is a cultural pastime in China and they've been passing time going through fighter jet plans, critical infrastructure ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
New data protection laws
by Richard E. Mackey, Jr., Contributor
Massachusetts 201 CMR 17.00 and Nevada's data protection law establish new standards for personal data protection
-
Disaster recovery plans and DLP solutions top 2010 priorities
Disaster recovery plans, DLP solutions, and regulatory compliance are top enterprise priorities, according to Information Security's Priorities 2010 survey
-
New data protection laws
by Richard E. Mackey, Jr., Contributor
-
-
Endpoint DLP fills data protection gap
by Rich Mogull
Learn how endpoint data loss prevention technology complements network DLP and secures data that users interact with on laptops, mobile and portable storage devices.
-
Attackers zero in on Web application vulnerabilities
Secure coding and vulnerability scanning could mitigate many Web application attacks
-
Endpoint DLP fills data protection gap
by Rich Mogull
-
Columns
-
Perspectives: Pet information security risks
by Ron Woerner
IT and security managers often make the mistake of being consumed with a specific risk or threat to the detriment of security
-
Schneier-Ranum Face-Off: Should we ban anonymity on the Internet?
Security experts Bruce Schneier and Marcus Ranum debate the possibility of eliminating anonymity on the Internet.
-
Leverage Google Attacks to Improve Cybersecurity
China's hacker attacks against Google's infrastructure, including Gmail accounts of human rights activists as well as Google's source code, should be used to educate enterprises about the reality of cyberespionage from nation states and organized criminals.
-
Perspectives: Pet information security risks
by Ron Woerner
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO