Researchers have discovered that Chinese sponsored government hackers have tried to penetrate at least 7 US companies since a pact was signed by the US and China agreeing to stop state sponsored hacking. Tim Erlin, director of IT security and risk Strategy at Tripwire have the following comments on it.
[su_note note_color=”#ffffcc” text_color=”#00000″]Tim Erlin, Director of Security and Product Management at Tripwire :
“Accurately attributing attacks is more of art than science. Adding a motivation criterion to the attribution requirements increases the complexity of actually coming to a firm conclusion.
The increasingly interconnected nature of commerce and government blurs the line between economic gain and espionage.
The cybersecurity pact between China and the US may seem clear on the surface, but its wording ensures that it’s unlikely either country will be forced into action.
The Whitehouse is unlikely to simply accept the contributed conclusions of a commercial cybersecurity company when the foreign policy implications are so significant.”[/su_note][su_box title=”About Tripwire” style=”noise” box_color=”#336588″]Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.