DiscoverSecurity Intelligence PodcastAre You Prepared to Respond to a Destructive Malware Attack?
Are You Prepared to Respond to a Destructive Malware Attack?

Are You Prepared to Respond to a Destructive Malware Attack?

Update: 2019-08-06
Share

Description

What’s the difference between a destructive attack and a traditional breach? “Destructive malware is malicious software that has the capability to render an effective system inoperable and also challenges reconstitution,” explains Charles DeBeck, a senior cyber threat intelligence researcher at IBM X-Force IRIS.

A kind of attack originally associated with nation-states, new research suggests an expanding trend in who is employing destructive attacks, and where. Wendi Whitmore, director of the IBM X-Force Threat Intelligence team, says, “The average cost of one of these attacks — a destructive incident versus a traditional breach — is actually 61 times higher.”

DeBeck and Whitmore join our hosts for a conversation about the evolution of destructive attacks, how organizations can defend against them, and how to best prepare for remediation.

For a further look at trends in destructive attacks, visit SecurityIntelligence.com: https://ibm.co/2OFUHs5
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Are You Prepared to Respond to a Destructive Malware Attack?

Are You Prepared to Respond to a Destructive Malware Attack?

IBM Security