Attack Attribution with John Davis

http://traffic.libsyn.com/sedaily/AttackAttribution.mp3Podcast: Play in new window | Download When a cyber attack occurs, how do we identify who committed it? There is no straightforward answer to that question. Even if we know Chinese hackers have infiltrated our power grid with logic bombs, we might not be able to say with certainty whether those hackers were state actors or rogue Chinese hackers looking for an offensive asset to sell to their government.

Continue reading…