NEWS

Cost of Cybersecurity: The Disaster That is a Long-Term Breach

Jeff Peters of HackSurfer reports on the Cost of Cybersecurity: The Disaster That is a Long-Term Breach. Sean Bodmer, chief researcher at CounterTack says
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
the "biggest concern is dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points. That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about."

IT Business Edge: The Downside of Twitter

In this story on IT Business Edge, The Downside of Twitter, Sue Marquette Poremba reported on the Twitter hack involving the Associated Press handle. CounterTack Chief Researcher Sean Bodmer weighs in, “I would wager this was meant to harm our International platform and partners as I am sure similar events occurred in March the Syrian President had to respond and recover from. Social Engineering has been in use for decades and there are numerous effects, just like the Dow Jones dropping this afternoon in the wake of the AP Tweet. There were also numerous calls across the world attempting to verify and validate the AP (a trusted group) story. Moreover, this took away from U.S. action items for the day to respond to the flood of requests.”

For Media Inquiries

Please email info@gosecure.net.

View News Mentions from Previous Years:

2018 News Mentions

2017 News Mentions