Strategy: Identifying and Discouraging Determined Hackers
Enterprise defenses have traditionally focused on finding and stopping malware rather than identifying and stopping those behind it. Now, increased efforts in the forensic examination of malware and how it communicates with command and control servers have enabled analysts to deduce where it came from and who wrote it. In addition, new technologies that claim to be able track an attack back to its source are being promoted.
In this Dark Reading report, we look at methods for tracing an attack back to its source and legal methods of taking action to discourage the adversary from targeting your enterprise again.