Summary: The news overflows with confident identification of cyberattackers. Today we have an account of hacking from a defender’s perspective, explaining the difficulty of attribution, written by our co-author Marcus Ranum. After reading this, you’ll regard the news about these things more skeptically.
Article deleted at author’s request.
Copyright © 2015, Tenable Network Security, Inc. All rights reserved.
About the author
See Marcus Ranum’s impressive profile on the page About the Authors of the Fabius Maximus website.
About Tenable Network Security
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense. For more information, please visit tenable.com.
For More Information
See all posts about cyber-war, cyber-espionage, and cyber-crime., including those about the Sony hack plus series by Edwin Covert and Marcus Ranum.
1 thought on “How do we identify our attackers in cyberspace?”
It’s actually very difficult in this full of activity life to listen newws on TV,
so I only use internet for that purpose, and get the latest news.