Access your Pro+ Content below.
Politics of cyber attribution pose risk for private industry
This article is part of the Information Security magazine issue of April 2017, Vol. 19, No. 3
Toward the end of the Obama administration, the Department of Homeland Security published a comprehensive list of the tools, techniques and indicators of compromise, called Grizzly Steppe, to out the Russians and their attempts to influence the 2016 presidential election. The Joint Analysis Report, issued in conjunction with the FBI, immediately highlighted the political side of attribution. Network administrators could access the findings in the report to protect their assets from malicious cyber activity such as malware. However, technical indicators on endpoints and networks were reportedly of poor quality, according to some cybersecurity teams, and roughly 40% were not specific to Russia. In the shadowy world of cyberespionage, the game of who is to blame can be complicated and fraught with politics and turf battles. Cyber attribution occurs when indicators of compromise (IOCs) and tactics, techniques and procedures (TTPs) from the entire cyber kill chain are associated with an advanced persistent threat or APT group. While ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Skill shortages and budget constraints have lead some companies to adopt a hybrid approach to managed security. Is it time for CISOs to start looking for 'expertise as a service'?
The vice president and CISO of ViaWest, Ilg is tasked with keeping the IT managed service provider and its cloud services secure.
Why nation-state attribution plays a major role in the U.S. government's willingness to share cyberthreat intelligence with private-sector companies.
Columns in this issue
Despite increasing levels of specialization, managed security service providers often don't understand the business you're in. That may be changing.
Grassroots efforts to shift cultural thinking in information security have had a positive effect, the former professor of computer engineering says.