Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Fraud Risk Management

The Difference Between Espionage and Financial Breaches

Verizon's John Grim on Why Espionage Breaches Are Tougher to Spot
John Grim, head of research, development and innovation at the Verizon Threat Research Advisory Center

Cyberespionage breaches take longer to discover than financial breaches. One of the biggest clues to finding them lies in understanding suspicious network traffic. John Grim of the Verizon Threat Research Advisory Center shares insight from a new study of cyberespionage trends.

See Also: Critical Condition: How Qilin Ransomware Endangers Healthcare

Grim, head of research, development and innovation at VTRAC, was part of a recent study of how espionage breaches behave differently from traditional financial breaches.

"In order to understand what suspicious traffic is, you need to understand what is normal," Grim says. "You need to have the means to capture that traffic and to capture the packets as well as detect these threat actors in real time."

In a video interview with Information Security Media Group, Grim also discusses:

  • How financial breaches are different from espionage breaches;
  • The industries most affected by espionage;
  • Security tools to leverage to detect cyberespionage attacks.

Grim is head of research, development and innovation at Verizon Threat Research Advisory Center. He has more than 18 years of experience leading investigations of data breaches and cybersecurity incidents within the government and civilian security sectors.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.