home_banner

Content Icon

Hacking Back: A Double-Edged Sword

August 13, 2018 | Webinar Replays | Threat Detection and Hunt Teaming | By John Strand, IANS Faculty,      Jake Williams, IANS Faculty

As online attacks continue to grow in frequency and ferocity, some in the security community are making the argument that the bad guys deserve a taste of their own medicine. Enter the notion of hacking back. The concept raises ethical questions, but some experts believe there are valid techniques that can and should be used to defend organizations. In this webinar, IANS Faculty John Strand and Jake Williams explore those techniques, address the ethical questions and help the audience find a happy medium.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Ransomware Preparation and Response Checklist (Updated)

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

For Best Anti-DDoS Results in AWS, Use AWS Shield Advanced

Distributed denial-of-service (DDoS) attacks are a major concern for all organizations. In this Ask-an-Expert written response, IANS Faculty George Gerchow recommends Amazon Web Services (AWS) users invest in AWS Shield Advanced to get the most protection.

Exec Comms Briefing: Apple Zero-Day Flaws Target Default iOS Mail App

Newly discovered flaws in all versions of Apple's iOS allow attackers to gain full access to email within iOS' built-in Mail app. In this briefing, IANS Faculty Jake Williams explains how the flaws are exploited and offers recommendations for protecting iOS devices while we wait for Apple to roll out a patch.

DNS Filtering and Blocking Tools: An Overview

DNS filtering and blocking tools work well, but they should be considered more of an add-on vs. a primary security control. In this Ask-an-Expert written response, IANS Faculty Jake Williams explains their pros and cons, and provides an overview of top vendors in the space.