Premium Content

Access "Offensive security involves proactive deception tactics"

Published: 28 Jan 2013

The discussion about the viability of enterprises to go on the offense against cybercriminal gangs is reaching a fevered pitch, with most experts questioning the legality of striking back at attackers. But security experts point out that there are some “offensive-like” tactics that have the ability to drive up the cost of hacking into a corporate network, and if deployed properly, the techniques could have a major impact on the threat landscape. “There are interesting questions about how far one can go and what types of attackers striking back will actually be effective against,” said Hugh Thompson, chief security strategist at Sunnyvale, Calif.-based Blue Coat Systems Inc. and RSA Conference program committee chairman. Thompson said he anticipates a greater discussion about offensive tactics in sessions at the annual security event scheduled at the end of February. “It doesn’t necessarily have to go from zero to launching a full out assault against cybercrime infrastructure. It could be much more subtle things like feeding people misinformation.” The issue ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Unlock new pathways to network security architecture
    ISM_august_2013.png
    E-Zine

    Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...

  • Emerging threat detection techniques and products
    threat_detection_technologies_cover.png
    E-Handbook

    Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...

  • The rapid evolution of MDM solutions
    ISM_june_2013_cover.jpg
    E-Zine

    Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...