This post is also available in: עברית (Hebrew)
One of the things the United States has learned from the war in Iraq was to foresee the threat lurking around the corner. Soldiers have realized that one of the main reasons for human casualties in Iraq wasn’t snipers shooting, but well hidden explosive devices along their path. It is only when the American forces started asking who is in charge of making these devices, where do they get the materials for them and how are they operating them – were they able to arrive at the planning process of the explosion, thus they could get to the devices before they were even placed in the field.
That is how ISight works – providing early intelligence regarding computer and network security threats, much like reconnaissance soldiers providing intelligence on enemy soldiers. ISight’s analysts put together the puzzle from fragments of information on the hackers’ intents, targets and techniques in order to provide their clients warning on an attack heading their way. They keep track of the weapons traders and the bombs assemblers in order to foil their plans in advance and to always be one step ahead.
Most companies of computers and network security focus on blocking threats, detecting an attack as it happens, or responding to it afterwards. The company’s analysts work below the surface in order to track cyber criminals before they plot their next attack.
The company reports help clients, among them are 280 government agencies including banks, credit companies, healthcare systems, oil companies and more, to prioritize the immediate and most destructive threats lurking around the corner. This prioritization is meant for companies drowning in countless alerts regarding possible cyber attacks, which creates “noise” preventing them from telling a real alerts from a false one, and thus to lose the ability to counter the attack in time.