“While botnet operators are using every trick in the book to expand their malicious activity, defenders for obvious reasons have to comply with the law when implementing the countermeasures,” said Carcano. “But as Microsoft’s actions show, this doesn’t mean that you cannot be creative with the technical and non-technical tools available. The beauty of this latest approach is that while defenders have to suffer the asymmetry of attackers operating behind the limits of the law, by taking the case to court, Microsoft gained a legal advantage to regain control.”
Recent Posts
Tags
Critical infrastructure (8)
Critical Infrastructure Cybersecurity (36)
Critical Infrastructure Security (9)
cybersecurity (69)
cyber threat analysis (5)
Defense in Depth (7)
Guardian (6)
ICS anomaly detection (23)
ICS Asset Inventory (13)
ICS Cybersecurity (63)
ICS Cybersecurity for Substations and Power Grids (5)
ICS Detection Challenge (7)
ICS intrusion detection (6)
ICS Operational Visibility (5)
ICS security (66)
ICS Threat Detection (5)
IEC 61850 (4)
IEC 62351 (9)
IIoT (6)
IIoT Security (7)
industrial control system (9)
Industrial Cybersecurity (52)
Industrial cybersecurity solutions (15)
industrial security (43)
Industroyer (7)
IoT (5)
IoT cybersecurity (15)
IoT devices (4)
IoT device security (5)
IoT Security (38)
IT/OT convergence (6)
Nozomi Networks (7)
Nozomi Networks Labs (5)
operational technology security (6)
OT Cybersecurity (34)
OT security (52)
Power Grid (5)
Power System Security (4)
ransomware (7)
S4 (5)
SANS ICS Survey (5)
SCADA security (12)
threat intelligence (7)
TRITON (8)
WG15 (6)