Internet Monitoring and Brand Protection
10 years ago | 9209 Views
A review of the past 10 years in cyber security opened our eyes here at Massive. Reflecting on over 50 international security conventions, hundreds of white papers and government policies, we now see the gaping whole in security industry comes down to one thing.
Any attack of a sizeable nature has to be planned, strategized and discussed. This means that somewhere there is a trace of the attack happening now having been discussed much earlier. In an article on malwarelist.net, the topic of pre-planned cyber criminal activity is covered well.
Internet monitoring for Brands has been around for a while. Primarily used for reputation or trend-mapping, use of tools like Radian6 are a fantastic for PRs, CMOs and Marketing Executives, but for the Chief Security Officer they are close to useless.
Let’s take the infamous Silk Road as an example. The underground hub of online drug dealing, illegal trading, hiring hitmen, paraphernalia and other sordid subjects like child porn; the underground Black Market protected itself nicely in the TOR Network. Covered in-depth in this article by Jivan Achreja, the TOR Network was the perfect, anonymous play ground for such a blatant criminal activity to thrive on for over 2 years until it was shut down by the FBI and NSA.
So that sums it up. Internet Monitoring is now vital for 2014 Brand Protection. To Learn more Check it out.
0
Tags: Internet, security, Brand Protection
Comments
secnews's iBlogs
What iBlog
-
RCSAndroid - one of the most professionally developed and sophisticated Android malware
Posted: 2015 July 23 | 7372 Views -
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
Posted: 2015 July 20 | 5782 Views -
Mobile Spy Software Maker mSpy Hacked
Posted: 2015 May 17 | 16746 Views -
Critical “Ghost” Remote Code Execution Vulnerability
Posted: 2015 February 01 | 9143 Views -
Awful things are what happens
Posted: 2015 January 16 | 6860 Views -
Four in 10 Americans face regular online fraud attacks
Posted: 2014 October 24 | 10077 Views -
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
Posted: 2014 October 16 | 10726 Views -
The NSA Gets an OK for Telephony Metadata Collection Yet Again
Posted: 2014 July 09 | 10714 Views -
Yet another wave of digital destruction is coming
Posted: 2014 March 02 | 11864 Views -
Internet Monitoring and Brand Protection
Posted: 2014 January 13 | 9209 Views -
Computer Threat 3rd Quarter 2013 McAfee Report
Posted: 2013 November 20 | 6409 Views -
NSA: The Future Of Cloud Computing In U.S.
Posted: 2013 October 23 | 7561 Views -
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
Posted: 2013 October 15 | 17020 Views -
New Intel Chips Contain Back-Door Processor
Posted: 2013 September 23 | 7923 Views -
New Version of ESET Social Media Scanner
Posted: 2013 September 17 | 6567 Views -
Trend Micro warns of new spam campaign
Posted: 2013 September 16 | 7283 Views -
FBI Admits It Controlled Tor Servers
Posted: 2013 September 16 | 6335 Views -
Latest Java update will block exploits
Posted: 2013 September 16 | 6411 Views
Categories
Tags iBlog
Libya Ngangizakuthanda Business gadgets mobile software Uthando Lwegazi Taliban Afghan Apple watch Marriage Restricted Cursulation Grand plan Zapu Zanu Windows 8 windows xp Mother-in-law Tongogara Nsa national security agency surveillance program Eset social media eset scanner twitter facebook Ntombiyami Nxayezwe