Attribution in cyberspace: Beyond the “whodunnit”

January 17, 2018

“The UK government judges that the Russian government, specifically the Russian military, was responsible for the destructive NotPetya cyber-attack. We call upon Russia to be the responsible member of the international community it claims to be rather then secretly trying to undermine it”, stated Lord Tariq Ahmad of Wimbledon, the Foreign Office Minister of State, in early 2018.1 NotPetya was easily one of the most devastating cyberattacks in recent times, affecting Europe, Asia, and the Americas. The attack was estimated to have cost businesses almost $1.2 billion.2 The NotPetya virus encrypted the hard drive of infected computers and was primarily seen as a Russian state-sponsored cyberattack masquerading as ransomware. The United Kingdom was joined by the United States and Australia in publicly attributing NotPetya to the Russian military3.

Spotlight

Netwrix Corporation

Netwrix Corporation is a rapidly growing IT company of dedicated professionals striving to make a difference in the world of data security. Organizations of all sizes rely on our products to protect their business-critical data and personal information of their customers and employees from cyber-attacks and data breaches. With 15 years of experience in the field, Netwrix continues its market expansion via innovation and acquisitions (NNT, Anixis, Stealthbits, Strongpoint & PolicyPak). Now the company is backed up by the leading private equity firm TA Associates. Netwrix is headquartered in Irvine, California, and has regional offices in the U.S., the UK, the Czech Republic and Russia (St. Petersburg).

OTHER WHITEPAPERS
news image

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

whitePaper | August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Read More
news image

Best Practices for Row Level Security in Tableau with Entitlements Tables

whitePaper | January 18, 2023

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

API Security: Best Practices for Vulnerability Mitigation

whitePaper | June 6, 2023

API Security: Best Practices for Vulnerability Mitigation provides a hands-on approach to mitigate security vulnerabilities in APIs. The paper emphasizes the importance of implementing security measures that protect the API and underlying infrastructure. The paper identifies various security vulnerabilities that can arise in APIs and provides detailed guidelines for securing them. These guidelines cover authentication, authorization, input validation, output encoding, error handling, logging, and auditing.

Read More
news image

Security Overview Whitepaper

whitePaper | February 6, 2023

All encryption/decryption operations are only performed by RoboForm locally on user’s devices and never on the RoboForm Server. RoboForm Data Objects and other user data is never sent to the Server in an unencrypted form. All communication between RoboForm Clients and Server are conducted over encrypted channels only.

Read More

Spotlight

Netwrix Corporation

Netwrix Corporation is a rapidly growing IT company of dedicated professionals striving to make a difference in the world of data security. Organizations of all sizes rely on our products to protect their business-critical data and personal information of their customers and employees from cyber-attacks and data breaches. With 15 years of experience in the field, Netwrix continues its market expansion via innovation and acquisitions (NNT, Anixis, Stealthbits, Strongpoint & PolicyPak). Now the company is backed up by the leading private equity firm TA Associates. Netwrix is headquartered in Irvine, California, and has regional offices in the U.S., the UK, the Czech Republic and Russia (St. Petersburg).

Events