In security response, practice makes perfect

02.10.2012

- Machine-to-human is not enough either as humans are prone to make mistakes

"We need a machine-to-machine-to-human system," said Henry.

It's important to recognize that the determined/sophisticated attacker is also human and will often possess distinctive characteristics geared toward avoiding detection. The attacker will hide in the network for long periods of time -- trying to extend its reach and gain intelligence on a continual basis as a means to map out the network so it can take down parts of the network and access sensitive information when the timing is just right.

Regardless of how and where humans interact with machines, organizations must be prepared to deal with so much more than the breach itself.