Internet Monitoring and Brand Protection
10 years ago | 9198 Views
A review of the past 10 years in cyber security opened our eyes here at Massive. Reflecting on over 50 international security conventions, hundreds of white papers and government policies, we now see the gaping whole in security industry comes down to one thing.
Any attack of a sizeable nature has to be planned, strategized and discussed. This means that somewhere there is a trace of the attack happening now having been discussed much earlier. In an article on malwarelist.net, the topic of pre-planned cyber criminal activity is covered well.
Internet monitoring for Brands has been around for a while. Primarily used for reputation or trend-mapping, use of tools like Radian6 are a fantastic for PRs, CMOs and Marketing Executives, but for the Chief Security Officer they are close to useless.
Let’s take the infamous Silk Road as an example. The underground hub of online drug dealing, illegal trading, hiring hitmen, paraphernalia and other sordid subjects like child porn; the underground Black Market protected itself nicely in the TOR Network. Covered in-depth in this article by Jivan Achreja, the TOR Network was the perfect, anonymous play ground for such a blatant criminal activity to thrive on for over 2 years until it was shut down by the FBI and NSA.
So that sums it up. Internet Monitoring is now vital for 2014 Brand Protection. To Learn more Check it out.
0
Tags: Internet, security, Brand Protection
Comments
secnews's iBlogs
What iBlog
-
RCSAndroid - one of the most professionally developed and sophisticated Android malware
Posted: 2015 July 23 | 7362 Views -
Boeing subsidiary Insitu would like to be able to deliver spyware via drone
Posted: 2015 July 20 | 5773 Views -
Mobile Spy Software Maker mSpy Hacked
Posted: 2015 May 17 | 16736 Views -
Critical “Ghost” Remote Code Execution Vulnerability
Posted: 2015 February 01 | 9129 Views -
Awful things are what happens
Posted: 2015 January 16 | 6854 Views -
Four in 10 Americans face regular online fraud attacks
Posted: 2014 October 24 | 10060 Views -
The Zero-day vulnerability CVE-2014-4114 impacting all versions of Microsoft Windows
Posted: 2014 October 16 | 10717 Views -
The NSA Gets an OK for Telephony Metadata Collection Yet Again
Posted: 2014 July 09 | 10702 Views -
Yet another wave of digital destruction is coming
Posted: 2014 March 02 | 11852 Views -
Internet Monitoring and Brand Protection
Posted: 2014 January 13 | 9198 Views -
Computer Threat 3rd Quarter 2013 McAfee Report
Posted: 2013 November 20 | 6398 Views -
NSA: The Future Of Cloud Computing In U.S.
Posted: 2013 October 23 | 7550 Views -
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail
Posted: 2013 October 15 | 16951 Views -
New Intel Chips Contain Back-Door Processor
Posted: 2013 September 23 | 7915 Views -
New Version of ESET Social Media Scanner
Posted: 2013 September 17 | 6558 Views -
Trend Micro warns of new spam campaign
Posted: 2013 September 16 | 7273 Views -
FBI Admits It Controlled Tor Servers
Posted: 2013 September 16 | 6317 Views -
Latest Java update will block exploits
Posted: 2013 September 16 | 6403 Views
Categories