A bill that would exclude organizations from prosecution for hacking back is already stirring up some concerns about potential unintended consequences.
Pen-tester Chris Nickerson will, in his Source Boston keynote, explain simple defensive approaches that can thwart the best red-teamers and advanced attackers alike.
Enterprises can use existing networking tools to put up internal barriers against hackers in order to frustrate them on to other targets.
In a talk Monday Christofer Hoff stressed that in security and martial arts alike, it’s hard to be a skilled defender if you don’t understand how your adversaries pull off the attacks.
CANCUN–Chris Hoff, vice president and CTO of the security business at Juniper Networks, compares the current enterprise security situation to that of a mixed-martial arts fighter who needs to be proficient in multiple disciplines.
Are hacking victims “hacking back”? That question was recently posed in headlines like this one from Bloomberg: FBI Investigating Whether Companies Are Engaged in Revenge Hacking. The Marketplace reporter, Ben Johnson, speculated that 2015 might be the year of “hacking back” when he asked me about revenge hacking. As I told Ben, there are several good