Cyber and DDoS attacks have regularly dominated headlines and newswires in 2015. In the past several months, the hackings of the US government’s Office of Personnel Management and Ashley Madison databases have ensured that such security breaches will remain large in the public’s conscious.
It’s no secret that the perpetrators of these attacks are big on sharing and collaborating on how to conduct and execute the hacks that rattle both the private and public sectors.
Sharktech Internet Services, the first and leading DDoS protection company, believes that security firms should take similar actions to help thwart future attacks.
“Rather than operate in complete isolation, security companies ought to collaborate amongst themselves and share resources and knowledge,” Sharktech President Tim Timrawi said.
Currently, websites such as Metasploit offer channels of communication between security professionals but Timrawi believes the open-source nature of these sites are their downfall as they can become Wikipedias of sorts for black hats.
“While Metasploit is a nexus of collaboration, the information can too easily fall into the hands of hackers,” he said.
Instead, Timrawi feels that such discussion should take place privately between security firms and their public sector counterparts.
“There are three and a half months left of 2015,” he said. “How many more large-scale attacks need to happen before such collaboration takes place? 2016 has the potential to be a very different year.”
More to Read
HostingAdvice.com About CAP
Apr
Understanding Edge Computing
In the ever-evolving landscape of technology, one term that has been gaining significant attention is
Mar
HostingAdvice.com About Sharktech
Check what one of the leading hosting news portals says about Sharktech.
Feb
Content Delivery Network Basics
In the ever-evolving landscape of web technologies, Content Delivery Network (CDN) has become a crucial
Feb
Kubernetes vs Docker Swarm
ntainer orchestration is crucial in handling the intricacies of deploying and scaling containerized applications. Two
Feb
Top 5 Ways To Protect Your Personal Data
In today’s digital age, our personal data is more vulnerable than ever. With the increasing
Jan