Lessons gleaned from the physical battlefield are just as applicable to the virtual battlefield as well. Intel teams are increasingly turning to identity intelligence as cybercriminals continuously attempt to obfuscate their identities and attack vector. A recent article by Amyn Gilani, VP of Product at 4iQ, notes success in slowing down the enemy is a direct result of unmasking adversaries, despite their best efforts to remain unseen.
Traces of cybercriminals’ identities are likely located across the surface, social, deep, and dark web, so cybercrime intelligence teams are now able to effectively neutralize and disrupt offensive cyber operations (OCO) and their infrastructures through a five-step approach that consists of moving quickly, making the data obsolete, reporting the attack, identifying threat vectors, and collaborating.
Businesses today can’t afford to be on the defensive; there’s always a real person behind an attack, and security operation leaders need to shift their focus to proactively catching the anonymous culprits behind a computer.