Searchlight

Consistent cybersecurity training a must to meet evolving threats

Karen Goulart, Senior Features Writer

As if cybercriminals' computer skills didn't make them crafty enough -- taking a page from IT organizations -- some hackers have upped their game by adding business acumen to their resumes. In this week's lead item, cybersecurity blogger Brian Krebs sheds light on one of the latest ways hackers are attacking. Got some pesky competition you want to "disrupt"? A distributed denial-of-service attack can be purchased as a service (What chutzpah! ) via secure online payment.

    Requires Free Membership to View

Karen Goulart

As Krebs explained in eye-opening detail, paying hackers to carry out dirty deeds isn't entirely new. Such "services" were available in the past, but required some major digging in the Web's darker corners. The difference today is these hired guns are making it easier for customers to find them (and finding them, they are) by working out in the open -- even producing commercials.

It's another stark example of how the old ways of doing cybersecurity -- throw on a patch, check the logs -- no longer cut it. As former White House CIO and security expert Theresa Payton put it in a piece on cybersecurity published on SearchCIO this week, cybersecurity is a team effort that requires CIOs and CISOs to be ever-vigilant about monitoring the evolving threat landscape, sharing that knowledge with everyone from the C-suite on down, and training employees as needed. Cybercriminals so often control the game these days, but making sure your team is privy to their playbook will go a long way toward your defense.

Check out SearchCIO's own coverage of these topics

Mobility boom, uneducated workers intensify security threats

User-friendly data security measures for cloud and mobile reach

CIOs seeking soft skills to better align with the business

Some less unsettling items round out this week's Searchlight, including a look at a new app for the politically minded consumer, what you need to know about Google's latest offerings, why we need to start talking about our future robot co-workers and more.

Let us know what you think about the story; email Karen Goulart, features writer.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Expert Discussion

Does your company have comprehensive data security training?

Karen Goulart, Senior Features Writer
What's your opinion?
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest