Partner Login

By Ed Amoroso, CEO, TAG Cyber

In perhaps the greatest scene of any movie ever, Harrison Ford as Indiana Jones watches an expert swordsman on the streets of Cairo swiftly brandish his weapon in advance of an epic fight. Jones watches the fanciful display, and then just sighs and points his pistol at the guy and shoots. This scene is the canonical example of how you can do things the hard way – or you can do things the easy way. I crack up every time I re-watch it on YouTube.

The reason I bring this up is that the familiar cyber security concept of attribution can be done the hard or easy way – although for most organizations, the choice is pre-made. Specifically, the relatively straightforward way to establish attack origin is to use a snitch, leak, or tap – and if you’re NSA, then this is how you would do it. But if you’re the rest of us, then you must rely on more complex technical clues to determine accurate attribution. Read the Full Article Here...


 

Just For You

View All