Break beyond the surface with Comox.
Learn from our deep well of experience.
Cyber Attribution for Enterprise
The reason I bring this up is that the familiar cyber security concept of attribution can be done the hard or easy way – although for most organizations, the choice is pre-made. Specifically, the relatively straightforward way to establish attack origin is to use a snitch, leak, or tap – and if you’re NSA, then this is how you would do it. But if you’re the rest of us, then you must rely on more complex technical clues to determine accurate attribution.
Microsoft Pours Millions into Startup that Nails Cybercriminals
Chris Davis, Hyas’s CEO and cofounder, describes his company’s mission as providing “to-the-doorstep attribution,” meaning that it pinpoints attackers’s whereabouts and helps law enforcement apprehend them. “My drive is to locate the bad guy,” he tells Fortune.