The SANS Cyber Threat Intelligence Summit 2017 was held in Arlington Virginia on January 31, 2017 and February 1, 2017.
Watch Rob Dartnall, Cyber Intelligence Director at Security Alliance present : The Use of conventional intelligence methodologies in Cyber Threat Intelligence
Online anonymity has become very popular with users becoming concerned about their privacy when using the Internet. TOR is one of the most widely used (and arguably, most effective) ways of maintaining a level of online anonymity. Although TOR has some great advantages, it nevertheless has its limitations.
One possible alternative to TOR is the Riffle anonymity network. But how does it the answer to the call for better online privacy?
Rob Dartnall, Cyber Intelligence Director at Security Alliance talks to The Banker’s Joy Macknight about intelligence-driven cyber security and the threat of IoT zombies.
Generally when conducting threat assessments, a tried and tested method is to assess the threat from four categories of threat actor:
- Nation state / Nation state proxies / Intelligence services
- Organised criminal gangs
- Hacktivists and hackers
- Malicious and unintentional insider