{"id":4212,"date":"2023-04-13T13:46:41","date_gmt":"2023-04-13T12:46:41","guid":{"rendered":"https:\/\/techinsight.net\/?p=4212"},"modified":"2023-04-13T13:46:41","modified_gmt":"2023-04-13T12:46:41","slug":"cybersecurity-experts-fight-back","status":"publish","type":"post","link":"https:\/\/techinsight.net\/cyber-crime\/cybersecurity-experts-fight-back\/","title":{"rendered":"Ali, Foreman, and \u201cThe Rumble in the Jungle\u201d"},"content":{"rendered":"<p><span style=\"font-weight: 400\">All the boxing world can talk about nowadays is the upcoming Mayweather-McGregor fight. The highly anticipated match-up will undoubtedly bring in millions upon millions of dollars, a hefty portion of which will be pocketed by both participants&#8211;win or lose. It will hopefully be an entertaining fight&#8211;unlike the Mayweather-Pacquiao duel&#8211;as the two legends duke it out in a traditional boxing ring. However, it is hard to imagine this fight eclipsing the greatness of world famous boxing matches of the past. Take for instance the 1974 \u201cRumble in the Jungle\u201d where Ali took the favored Frazier to eight rounds before putting him on his back with a devastating right hand. Frazier looked unstoppable, and Ali looked unbeatable&#8211;though the exact opposite proved to be the case. In many ways, the fight between cyber criminals and cyber security experts is panning out in a similar way. With the onslaught of cyber attacks in this year alone, it looks like cyber criminals have the upperhand. But some cybersecurity experts are taking a page out of the Greatest\u2019s Playbook, floating like a butterfly and stinging like a bee.<\/span><\/p>\n<p><b>The First Rounds Aren\u2019t Looking too Great<\/b><\/p>\n<p><span style=\"font-weight: 400\">It comes as no surprise that 2017 hasn\u2019t been a great year for cybersecurity experts. There have been a seemingly countless number of attacks, ranging from the infamous Wanna Cry virus to cases of <a href=\"https:\/\/techinsight.net\/category\/trending-tech\/blockchain\">blockchain<\/a> hacking that have left cyber victims suffering. One <\/span><a href=\"https:\/\/securityintelligence.com\/incident-response-and-threat-intelligence-a-potent-one-two-punch-to-fight-cybercrime\/\"><span style=\"font-weight: 400\">report<\/span><\/a><span style=\"font-weight: 400\"> sums it up well, \u201c[it is] no longer enough to simply implement incident response solutions. Today\u2019s threats require a dedicated team of security experts to maximize these tools with dynamic, continuously updated threat intelligence.\u201d The current landscape has left many wondering how to combat the increasingly complex threats facing the common computer user.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Some cybersecurity experts have made themselves available for dialogue, in an attempt to help the everyday layman grasp what\u2019s going on behind the scenes. One such person is Mike Oppenheim, the global research lead for IBM\u2019s X-Force IRIS (Incident Response and Intelligence Services). In a <\/span><a href=\"https:\/\/securityintelligence.com\/incident-response-and-threat-intelligence-a-potent-one-two-punch-to-fight-cybercrime\/\"><span style=\"font-weight: 400\">recent interview<\/span><\/a><span style=\"font-weight: 400\">, Oppenheim commented that the attacks that have happened so far \u201creally highlight the need for visibility within networks and underscores the need for companies to have a good incident response plan so that they know how to respond in the face of these huge global incidents.\u201d It is not enough to react to attacks&#8211;companies and firms need to learn how to detect and neutralize hostile threats. The team that Oppenheim leads is \u201con the ground\u201d when attackers are active, allowing them to gather a large amount of data. Because of their data collection efforts, the team creates a \u201creally good response service to try to figure out root cause analysis and also stop attackers from actually accomplishing their goals.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">Like a great boxer, IRIS is able to study and analyze the movements of cyber attackers. Then, in a quick counterpunch maneuver, cybersecurity experts at IRIS can both fend off the attack and shut it down. Another encouraging aspect of the developments of IRIS is its expansion to IBM products. Undoubtedly the end goal is not just an improvement in IBM Security Services, but advances in IBM\u2019s specific products and ultimately cybersecurity as a whole. Though it seems like cyber criminals have the upper hand, cyber security experts hope to stand over their opponents and declare \u201cI am the greatest.\u201d<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>All the boxing world can talk about nowadays is the upcoming Mayweather-McGregor fight. The highly anticipated match-up will undoubtedly bring in millions upon millions of dollars, a hefty portion of which will be pocketed by both participants&#8211;win or lose. It will hopefully be an entertaining fight&#8211;unlike the Mayweather-Pacquiao duel&#8211;as the two legends duke it out [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":4215,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[230,231,233,234],"class_list":{"0":"post-4212","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-crime","8":"tag-cyber-crime","9":"tag-cyber-defense","10":"tag-cyber-security","11":"tag-cyberattacks"},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts\/4212"}],"collection":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/comments?post=4212"}],"version-history":[{"count":0,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts\/4212\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/media\/4215"}],"wp:attachment":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/media?parent=4212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/categories?post=4212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/tags?post=4212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}