• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Malware   »   Shall We Play A Game?

Shall We Play A Game?

  • Posted on:November 4, 2012 at 9:56 pm
  • Posted in:Malware
  • Author:
    Trend Micro
0

In American football, reviewing films from previous game days is fundamental to achieving victory on Sunday. Understanding an opponent’s tactics and stratagems is critical to crafting a defensive strategy for a football team. Reviewing your upcoming opponent’s past games helps you to have a direct understanding of how they really operate and what they’re likely to do when it’s your turn to face them. Implicit in taking the time to understand your opponent like this is the fact that you recognize that you’re facing a skilled opponent, and are paying appropriate respect to your opponent and their skills.

In a new opinion piece titled The Knight Fork: Defining Defense in 2013, Trend Micro’s Tom Kellermann reviews the “game day films” of cyberattacks and APT campaigns of the past year. As we get ready to enter 2013, he looks at these past trends to outline what defensive tactics may define risk management for security professionals in the coming year.

In this short paper, he draws on one of the key defensive principles in chess, the idea of the “knight’s fork”, a move that is assured of success by simultaneously attacking two pieces at once. Similarly, in an increasingly dangerous world with equally limited budgets, he outlines areas of focus that can maximize defensive benefit with the greatest cost benefit.

As Tom says, “The greatest head coaches as the greatest hackers are all grandmasters of chess. As we close out 2012 we must ask ourselves – how might we spin the cyber chess board and create a knight’s fork?”

Take some time and read The Knight Fork: Defining Defense in 2013 and you’ll get some ideas on how you can better protect your environment by creating a knight’s fork for 2013.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: APTcyberattacksopinion

Featured Stories

  • systemd Vulnerability Leads to Denial of Service on Linux
  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability
  • A Closer Look at North Korea’s Internet
  • From Cybercrime to Cyberpropaganda

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing
  • XTRAT and DUNIHI Backdoors Bundled with Adwind in Spam Mails
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • Not Only Botnets: Hacking Group in Brazil Targets IoT Devices With Malware

Popular Posts

  • New MacOS Backdoor Linked to OceanLotus Found
  • Monero-Mining HiddenMiner Android Malware Can Potentially Cause Device Failure
  • ChessMaster Adds Updated Tools to Its Arsenal
  • Ransomware XIAOBA Repurposed as File Infector and Cryptocurrency Miner
  • Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.