For a while now, we have been inundated with news of breaches across the entire spectrum – from the entreprise, to the public sector and it seems it wouldn’t abate anytime soon. The defacto reactionary measures put in place to mitigate polymorphic threats has failed immeasurably and it will be strategic to delve into other playbook(s) in our zest to finding holistic solutions to this malaise. Patterning the present threat landscape imbuing counterterrorism strategies will aid quick detection of anomalous behaviour.
Intrusion detection strategies have always focused on system vulnerabilities, and thereby ascertain immediate threats and not strategic patterns. When you take an introspective look at the current threat landscape, which in itself is quite fierce, it demands strategic-level insights of the all-encompassing threat which includes but isn’t limited to newer tactics, techniques, and procedures. When the Cyber Kill Chain was promulgated to serve as a yardstick for cyber-intrusion detection a while back, intrusions were quite mild as compared to now.Read More »