Endless Supplies Corporation ships worldwide, provides same day quotes, and carries CPUs, Storage Devices, Notebooks, Servers, Monitors, Office Equipment, Computers, Motherboards, Graphics Cards, Displays, Wireless Networking, Cases, Consumer Electronics, Software, and more. E-procurement systems for B2B, B2G, and B2C sales. Email us today.
Wednesday, May 3, 2017
THREAT INTELLIGENCE THREATENING INTEL OPERATIONS
Catherine Lotrionte Georgetown University Security researchers and malware reversers have morphed into threat intelligence brokers. You discover a new malware sample, do your magic, and staring you in the face is a multi-million dollar nation-state operation targeting suspected terrorists. Or, your newest amazing discovery is a key piece of a global law enforcement surveillance effort to nab an online sex trafficking or pedophilia ring. As much as we’d like to paint cyber operations as black-and-white, ethical dilemmas run deep in an industry that battles to limit the visibility of ‘attackers’ without questioning the merits of surveilling individuals and organizations intent on causing harm. I intend to kickstart a discussion about this very real issue, discuss the moral dilemma faced by researchers, and find some common ground between the ‘attackers’ and ‘defenders’. http://ift.tt/1GdA8p9 Twitter @KasperskySAS
by Kaspersky Lab via Endless Supplies .Us - Brands
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment