Innovation in the cyber identity space is needed and is becoming more critical with looming cyber threats.
Online PR News – 30-March-2010 – – In the next five to ten years, a nation state or terrorist organization will use the Internet to try to manipulate the U.S. economy. Also, in five to ten years we'll have a cyberwar that turns into a shooting war. Enterprises should focus on applying investigative techniques such as forensic analysis to track down the source of cyberattacks. Investigators can take advantage of the anonymity of the Internet in their work.
Attribution is probably the number one issue in terms of cyberspace. It's a tough, sprawling issue, and privacy advocates are rightly concerned about cyber identity
Evading identification is an old game to hackers. They bounce through multiple systems in multiple countries to evade Internet attribution. Internet attribution wouldn't be so much of an issue if systems were built to be more resilient.
"We need to recognize that attribution is needed because we need to hold people accountable." said Dennis Pearson CEO of Pearson IT."We might have an express right to freedom of speech, but not privacy," he added.
About Pearson IT
Pearson IT provide strategic IT consulting services in the area of IT system integration, advanced network management solutions and application delivery strategies, along with the ability to execute those IT solutions. Our consultants specialize in network installation, information security, Microsoft and Cisco support, help desk administration management systems integration, software package implementation, application development and more. Pearson IT handles both short-term and long-term consulting projects.