Access "The hacktivist threat to enterprise security"
This article is part of the October 2012 issue of Security Readers' Choice Awards 2012: Your picks for the best security products
Ask Adam O'Donnell the difference between hacktivists today and those 15 years ago or more, and you won't get a simple answer. Technology has changed, social norms are different and political motivations are diverse. "Back then there was less interest in the techniques of breaking into people's systems and exposing data that you see today," says O'Donnell, a noted antimalware expert and early hacker before he founded Immunet, which was acquired by security vendor Sourcefire. "Today it's like a decentralized religion; there's an ethos and anyone can label themselves of being part of it… and some groups are more bent in one direction or another, but they're all under the same value system: sticking a finger in the eye of the man." Indeed, today's hacktivists – notably those affiliated with Anonymous – are slightly different than the original hacktivists groups, such as Cult of the Dead Cow (cDc). Experts say the cDc was more centralized, granting membership to individuals based on their skills. The cDc's aim mainly was to defend human rights and freedom of ... Access >>>
Premium Content for Free.
2012 Readers' Choice Awards
For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
The hacktivist threat to enterprise security
by Robert Westervelt
With their goal of damaging corporate reputations, hacktivists aren't your average cybercriminals.
- 2012 Readers' Choice Awards
Threat prevention techniques: Best practices for threat management
by Diana Kelley, Contributor
A successful threat management program requires effective processes, layered technology and user education.
Malware trends: The rise of cross-platform malware
by Moriah Sargent
Security researchers are finding more malware that attacks multiple operating systems.
- Threat prevention techniques: Best practices for threat management by Diana Kelley, Contributor
Big data issues: Big data analytics offers both rewards and risks
by Steve Durbin, Contributor
Companies are under pressure to take advantage of big data analytics but they should be aware of the risks.
The bolt-on information security trend needs to end
by Doug Jacobson and Julie A. Rursch
Unless security is viewed as a core function instead of an add-on, we're bound to repeat the mistakes of the past.
Java security problems: Is disabling Java the answer?
by Marcia Savage
In the wake of recent exploits, experts recommend disabling the programming language but that can be tricky in the enterprise.
- Big data issues: Big data analytics offers both rewards and risks by Steve Durbin, Contributor
More Premium Content Accessible For Free
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...