![Security Intelligence Podcast artwork](https://is1-ssl.mzstatic.com/image/thumb/Podcasts113/v4/6f/d9/5c/6fd95cf3-d311-7c25-7975-7d3f1f3aa1c8/mza_2647009549982595660.jpg/100x100bb.jpg)
Are You Prepared to Respond to a Destructive Malware Attack?
Security Intelligence Podcast
English - August 06, 2019 11:03 - 37 minutes - 43.3 MB - ★★★★★ - 34 ratingsTechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
What’s the difference between a destructive attack and a traditional breach? “Destructive malware is malicious software that has the capability to render an effective system inoperable and also challenges reconstitution,” explains Charles DeBeck, a senior cyber threat intelligence researcher at IBM X-Force IRIS.
A kind of attack originally associated with nation-states, new research suggests an expanding trend in who is employing destructive attacks, and where. Wendi Whitmore, director of the IBM X-Force Threat Intelligence team, says, “The average cost of one of these attacks — a destructive incident versus a traditional breach — is actually 61 times higher.”
DeBeck and Whitmore join our hosts for a conversation about the evolution of destructive attacks, how organizations can defend against them, and how to best prepare for remediation.
For a further look at trends in destructive attacks, visit SecurityIntelligence.com: https://ibm.co/2OFUHs5