Добавить
Уведомления

What is the role of technical attribution?

The world is currently full of upcoming cyberthreats. Criminals are spreading advanced and sophisticated new malware, hijacking vulnerable data and holding critical business files ransom. When you hear about a new attack in the news, your first thought is usually, “Who is behind this?” However, answering that question is impossible without technical attribution – taking apart all the technical features of the attack and relating them to cyber-incidents that have already occurred. It is this method that allows cybersecurity experts to identify who the attacker was and, more importantly, how to build stronger defenses that will prevent possible future attacks. In this video, Kaspersky experts discuss in detail how technical attribution is provided, what challenges and limitations it faces, and why accurate and transparent technical attribution is the key to future cyberspace stability. If you want to learn more about threat attribution, watch the webinar on Securelist, where Kaspersky experts, Vitaly Kamluk and Kirill Vorozhtsov, walk you through some examples using real-life APT malware samples and explain how threat attribution can improve security operations and incident response. The webinar link: https://kas.pr/2n1e. 0:00 – Intro 0:40 – What is technical attribution? 1:25 – What does attribution consist of? 2:57 – What are the limitations of technical attribution? 5:07 – What is the risk of incorrect attribution? 6:31 – Why would somebody need to know about cyber attribution? 7:49 – Outro #Kaspersky #TechnicalAttribution #GReAT #Attribution #CyberAttribution #CyberSecurity

Иконка канала JS Веб-гуру
73 подписчика
12+
16 просмотров
2 года назад
12+
16 просмотров
2 года назад

The world is currently full of upcoming cyberthreats. Criminals are spreading advanced and sophisticated new malware, hijacking vulnerable data and holding critical business files ransom. When you hear about a new attack in the news, your first thought is usually, “Who is behind this?” However, answering that question is impossible without technical attribution – taking apart all the technical features of the attack and relating them to cyber-incidents that have already occurred. It is this method that allows cybersecurity experts to identify who the attacker was and, more importantly, how to build stronger defenses that will prevent possible future attacks. In this video, Kaspersky experts discuss in detail how technical attribution is provided, what challenges and limitations it faces, and why accurate and transparent technical attribution is the key to future cyberspace stability. If you want to learn more about threat attribution, watch the webinar on Securelist, where Kaspersky experts, Vitaly Kamluk and Kirill Vorozhtsov, walk you through some examples using real-life APT malware samples and explain how threat attribution can improve security operations and incident response. The webinar link: https://kas.pr/2n1e. 0:00 – Intro 0:40 – What is technical attribution? 1:25 – What does attribution consist of? 2:57 – What are the limitations of technical attribution? 5:07 – What is the risk of incorrect attribution? 6:31 – Why would somebody need to know about cyber attribution? 7:49 – Outro #Kaspersky #TechnicalAttribution #GReAT #Attribution #CyberAttribution #CyberSecurity

, чтобы оставлять комментарии