Ira Winker: Does recent hacktivism news justify enterprise hacktivism defense?

Ira Winker: Does recent hacktivism news justify enterprise hacktivism defense?

Date: Mar 15, 2012

There's been plenty of recent hacktivism news involving rogue groups like Anonymous and LulzSec, but the question for enterprises is, does the hacktivism threat justify a specific enterprise hacktivism defense?

Some experts say it does, but Ira Winkler isn't one of them. In this video interview from RSA Conference 2012, the chief security strategist of Codenomicon explains why hacktivism isn't a legitimate concern for enterprises, what the future of hacktivism may look like and why those looking to conduct cyberattacks against controversial groups may not be hacktivists at all.

More on Hacker Tools and Techniques: Underground Sites and Hacking Groups

  • canderson

    Why advanced threats are less dangerous than simple attacks

    VIDEO - Video: BeyondTrust's Marc Maiffret explains why simple attacks are often more effective than advanced threats.
  • canderson

    Gary McGraw warns against conflating cyberwar and cyberespionage

    VIDEO - In this video interview, Cigital CTO Gary McGraw draws a distinction between cyberwar and cyberespionage, saying the two are often wrongly conflated.
  • canderson

    Bruce Schneier: China cyberwar rhetoric risks dangerous implications

    VIDEO - Video: Bruce Schneier explains why ongoing China cyberwar rhetoric evokes the wrong responses and may damage personal privacy, and ultimately freedom.
  • pre-installed malware

    Definition - Pre-installed malware is malicious software that is put on a machine before it is delivered to the user. New devices are usually assumed to be uncompromised but there are numerous reports of malware existing on new hardware.
  • The value of open source intelligence tools to enterprises

    Answer - Expert Joseph Granneman offers advice to enterprise security teams on using open source intelligence tools to learn about potential threats.
  • Protect your enterprise from hackers for hire

    Answer - Hackers for hire pose significant enterprise risks. Does your organization know if it's a target? Get the low-down on these organized crime groups.
  • peer-to-peer botnet (P2P botnet)

    Definition - A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge.  Just as in the traditional botnet, which includes a command-and-control server, the bots are typically infected with a Trojan horse and are often used for sending spam or performing DDoS (distributed denial of service) attacks.
  • botnet topology

    Definition - A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: