Attackers Can Pivot through Your Infrastructure, What if You Could Pivot through Theirs? (OpenDNS)
As the threat landscape continues to evolve, the massive amounts of data and traffic flowing through enterprise networks are becoming increasingly vulnerable; threat management through traditional detect-and-respond approaches is now virtually impossible. Without copies, samples or details how can security teams possibly prevent, contain and inform on targeted attacks? We will introduce one of the industry's newest research techniques: analyzing the attacker infrastructure. With this approach, security teams can learn how to leverage big data and algorithms to predict and prevent attacks before they happen.