Think Information. Think Security.
June 27th, 2012
Paul Henry and Paul Zimski have a discussion regarding weaponized malware, while the threats that dominate headlines... Stuxnet (2009), DuQu (2010) and Flame (2011) seem like story lines that spy movies are made of, they are infact something enterprise should be concerned about. The weaponization of software has moved into a new age of cyber attacks. 

Like it or not, weaponized malware has become part of the mainstream. [Case in point: Google now notifies Gmail users when their accounts come under attack from an IP address that doesn’t match up.]

And while our nation’s critical infrastructure is likely your first thought when it comes to state-sponsored malware targets, you should also consider what that means for the enterprise and intellectual property. Now that the U.S. admitted its role in Stuxnet, “it’s safe to expect increased retaliation from any nation with an internet connection,” said  Paul Henry.

"If I were a gambling man, I’d also bet big on weaponized malware variants hitting enterprises around the world. Soon. Not that long ago, it was 13-year-olds working from their basements to impress their friends with a unique hack. Today, nation state funding exists for the development of very sophisticated, targeted attacks on other nations that then can be engineered by hackers to target your most valuable information".

We need to evolve our defenses. What we’ve always done is no longer good enough.

Cross-posted from: Richard Stiennon

Leave a Reply.