Breach Preparedness , Cybercrime , Data Breach

How Attackers Use Digital Footprints

Hans Barre of RiskIQ Says Unknown Assets Can't Be Protected
Hans Barre, cybersecurity consultant, APAC, RiskIQ

Many organizations don't have a full grasp of their digital footprints, which attackers analyze closely when plotting intrusions, says Hans Barre of RiskIQ.

See Also: Live Webinar | Cybercrime 2.0: A New Era for the Identity and Authentication Challenge

In this video interview at the recent RSA APJ 2018 conference in Singapore, Barre discusses:

  • How attackers profile the applications an organization has developed as well as social media profiles and web infrastructure;
  • How aware organizations are of their digital footprints;
  • The common changes organizations make to reduce their attack surfaces.

Barre is a cybersecurity consultant with RiskIQ based in Taiwan. He previously was a senior manager with Deloitte and a senior systems engineer with QinetiQ.


About the Author

Jeremy Kirk

Jeremy Kirk

Managing Editor, Security and Technology, ISMG

Kirk is a veteran journalist who has reported from more than a dozen countries. Based in Sydney, he is Managing Editor for Security and Technology for Information Security Media Group. Prior to ISMG, he worked from London and Sydney covering computer security and privacy for International Data Group. Further back, he covered military affairs from Seoul, South Korea, and general assignment news for his hometown paper in Illinois.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.