Vendor impersonation attack is making the rounds, and what’s new is that the brands and reputations of cybersecurity providers are being leveraged as part of these attacks, where the ultimate goal is to deposit malware into your production environment.
Field CTO at NetWitness
Ben Smith is Field CTO with NetWitness. He brings more than 25 years’ experience in the information security, risk management, networking and telecommunications industries. Smith holds industry certifications in information security (CCISO, CISSP), risk management (CRISC), and privacy (CIPT); he is an acknowledged contributor to NIST SP 1800-1, -3, and -7; and he chairs the Cybersecurity Canon Project. He is a patent holder, authored four of the "97 Things Every Information Security Professional Should Know" [O'Reilly, 2021] and was previously a corporate representative to the National Cybersecurity Center of Excellence (NCCoE).
Perfectly targeted advertising is just information. It reduces or distills the noise down to information which is welcomed by the recipient. What does this have to do with your threat intelligence program? Everything.
We are living in the middle of an arms race in cybersecurity. Adversaries are leading the way, while the good guys reconfigure and retool, and the cycle continues. What does the crystal ball look like for the cybersecurity and risk management world of 2022?