Halting Hackers

With headlines screaming about hacking, of the latest James Bond movie Skyfall most recently, of national and nuclear weapons laboratories not so long ago, and of businesses and individuals almost on a daily basis, it’s no surprise that worldwide information technology (IT) security spending is set to hit $77 billion in 2015—almost 8 percent more than this year’s $71 billion, according to IT researcher Gartner, Inc. 

Written byBernard B. Tulsi
| 7 min read
Register for free to listen to this article
Listen with Speechify
0:00
7:00

Increased Cyber Security Needed to Thwart Ever More Devious Cybercriminals

The increases are attributed to escalating mobile technology, cloud-based systems, and social media, among others, rather than regulations, which drove growth during the past few years.

Ryan Olson, director of Threat Intelligence at Palo Alto Networks, says cyber security is a massive issue confronting the entire world. Within the past five years it has become much clearer that the issue is less about mischievous or malicious intent than about stealing assets for economic gain. This was made even more evident by the recent increases in cyber espionage attacks in which organizations potentially sponsored by nation states infiltrate company networks to steal their data.

Sumedh Thakar, chief product officer at Qualys, says that bad actors have moved on from merely seeking some degree of fame. “They are now organized to attack companies and research laboratories for financial gain,” he says.

Olson says that the motivations of adversaries, such as cyber crime (to steal money), espionage (to steal information), terrorism (to invoke fear through an attack), war (nation states trying to harm each other in the cyber world), and hacktivism (launching attacks to draw attention to particular causes), are helpful to intelligence analysts who are trying to decipher the objectives and likely tactics of specific adversaries. “Ultimately, the goal on our side is to apply effective tools to help prevent their attacks,” he says.

In business, scientific enterprises, and laboratory settings, risk analysts are most concerned with three types of attackers, according to Amichai Shulman, chief technology officer at Imperva. Criminal hackers, the largest category, are simply after profit, and are of greatest concern to most organizations. State actors are complex and have defined agendas. Hacktivists believe they are sure about what they are after but are not always right, says Shulman.

To continue reading this article, sign up for FREE to
Lab Manager Logo
Membership is FREE and provides you with instant access to eNewsletters, digital publications, article archives, and more.

About the Author

Related Topics

CURRENT ISSUE - October 2025

Turning Safety Principles Into Daily Practice

Move Beyond Policies to Build a Lab Culture Where Safety is Second Nature

Lab Manager October 2025 Cover Image