Executive Briefings

Companies Begin Taking the Cyber Battle to the Hacker

With worries about data breaches and privacy violations mounting by the day, corporations are becoming more aggressive about preventing physical and financial losses, experts say. In some cases, they add, that can involve counterattacks against hackers.

Indeed, the trend amounts to a "paradigm shift" in cyber risk management, says Larry Ponemon, chairman and founder of the Ponemon Institute, a research and consulting firm focusing on privacy and data protection.

"There are organizations that are beginning to develop the capability of identifying the bad guy using intelligence. It's sort of like a mini-CIA at the organizational level in order [organized] to understand where the attack is originating from," says Ponemon.

With that intelligence in hand, such companies "can basically bring the fight to the bad guy" by aiming malware or by launching a denial-of-service attack at the servers of the potential perpetrators, he said. If an attack comes from outside the United States, companies here can also work with telecommunications companies to deflect the attack, he added.

Read Full Article


Keywords: enterprise cyber security, cyber attacks, data integrity & protection, business disruption, event management, supply chain management, supply chain management IT, supply chain solutions

Indeed, the trend amounts to a "paradigm shift" in cyber risk management, says Larry Ponemon, chairman and founder of the Ponemon Institute, a research and consulting firm focusing on privacy and data protection.

"There are organizations that are beginning to develop the capability of identifying the bad guy using intelligence. It's sort of like a mini-CIA at the organizational level in order [organized] to understand where the attack is originating from," says Ponemon.

With that intelligence in hand, such companies "can basically bring the fight to the bad guy" by aiming malware or by launching a denial-of-service attack at the servers of the potential perpetrators, he said. If an attack comes from outside the United States, companies here can also work with telecommunications companies to deflect the attack, he added.

Read Full Article


Keywords: enterprise cyber security, cyber attacks, data integrity & protection, business disruption, event management, supply chain management, supply chain management IT, supply chain solutions