Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How do hackers become insiders who are able to move around and manipulate such a secure network?

0
Posted

How do hackers become insiders who are able to move around and manipulate such a secure network?

0

Bingham: We use what we call the physics of networks to recognize when unusual activity is taking place. Our knowledge of networks allows us to establish the same physical layout for all of them. We don’t even need a baseline of data. We could come in today and immediately tell you if there was suspicious activity. Right now, Cisco’s big problem — aside from the egg on their face — is that they don’t know how much of their network was compromised. It’s like coming home and knowing a burglar was in your house, but you can’t be sure what they did or what else they might have taken. They’re going to have to spend a lot of time and money combing every inch of their systems. That’s not a small job. We would be able to tell them immediately where the intruder had likely been and what they did while they were in there.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123