The Maturing Cyber Crime Economy and Supply Chain: It's “When” Not “If”
Business Solutions Hacking is as old as computing itself. Here's what you need to know about cyber criminals from David Pack, Manager at LogRhythm Labs.
For years there have been online communities where black hats (i.e., the bad guys) exchange ideas, share tools and exploits, and brag about their latest achievements. But a mature cyber crime economy and supply chain have emerged virtually overnight in a way that’s forcing organizations of all shapes and sizes—from Fortune 500 companies and large federal agencies to community banks and local hospitals— to think very di erently about information security.
Today, cyber criminals have ready-access to for-sale malware, exploits and for-hire resources necessary to perpetrate virtually any online crime or cyber attack. This ever-expanding supply chain acts as a force multiplier for online crime, hactivism and cyber terrorism.
"Today, cyber criminals have ready-access to for-sale malware, exploits and for-hire resources necessary to perpetrate virtually any online crime or cyber attack. "
Most organizations, even those with the most sophisticated information security arsenals, realize that it’s no longer a matter of “if” they’ll be breached but “when.”
Best practices dictate continuous monitoring of all activity across the enterprise, ongoing situational awareness and an ability to respond swiftly and e ectively when events arise.
Next generation security information and event management (SIEM 2.0) offers the most comprehensive platform for defense, detection and response amidst the mutating security landscape.