Wednesday, May 3, 2017

THREAT INTELLIGENCE THREATENING INTEL OPERATIONS


Catherine Lotrionte Georgetown University Security researchers and malware reversers have morphed into threat intelligence brokers. You discover a new malware sample, do your magic, and staring you in the face is a multi-million dollar nation-state operation targeting suspected terrorists. Or, your newest amazing discovery is a key piece of a global law enforcement surveillance effort to nab an online sex trafficking or pedophilia ring. As much as we’d like to paint cyber operations as black-and-white, ethical dilemmas run deep in an industry that battles to limit the visibility of ‘attackers’ without questioning the merits of surveilling individuals and organizations intent on causing harm. I intend to kickstart a discussion about this very real issue, discuss the moral dilemma faced by researchers, and find some common ground between the ‘attackers’ and ‘defenders’. http://ift.tt/1GdA8p9 Twitter @KasperskySAS
by Kaspersky Lab via Endless Supplies .Us - Brands

No comments: