Today’s columnist, Marc Rogers of Okta, writes that security pros need to understand the motivations of their adversaries. Rogers points out that financially-motivated hackers operate like businesses ecosystems, with suppliers providing different parts of the operational needs and steps taken to offset costs to maximize profits. (CREDIT: Getty Images)

“If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Sun Tzu, The Art of War

Security pros need to uncover hacker motivation in understanding the tactics, techniques, and procedures (TTPs) that are likely in play with any given hack. Once security teams know the techniques being used by a particular attacker, they can quickly rule out less likely attack categories. Understanding TTPs are also important in tracking attacker campaigns and mounting effective, proactive defenses. For example, once the team knows that an attacker favors a common technique, they can pre-warn likely targets with actionable information that lets them protect themselves.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.