Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Anti-botnet workgroups maybe an enterprise's biggest asset during a data breach, according to experts.
SecureWorks malware research director Joe Stewart said sophisticated intrusions were a headache for IT security professionals.
"There are a lot of companies that did not worry about attacks that are going to be faced with responding to very serious incidents that they are just not prepared for," Stewart said during a panel session at the RSA Conference 2012 in San Francisco.
"Some day, having that relationship with working groups will come in very handy when they're facing an attack and don't know how to handle it."
Richard Howard general manager of VeriSign iDefense who also chaired the panel said "real resources" were needed to "have a shot at taking down massive botnet attacks."
"They have to have to be the right size, have a team of lawyers, and need the technical guys that know how to stop and implement the proper security."
The panel noted a number of current working groups that help to facilitate sharing of cyber intelligence, including the Network Security Information Exchange and the Forum for Incident Response and Security Teams.
"A lot of what a breach is revolves around the targeted nature," Stewart said. "You can have situations that start looking like a botnet, but once you look into it more it could be something that is targeted."
In addition, they said building intelligence-driven security is key, especially as more businesses accept the reality of compromise.
"Successful companies will have a blend of intelligence," Howard said. "They will pursue collaborative intelligence and they will nurture native intelligence to spot what's next."
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.