8 top cyber-attack maps and how to use them

Spread the love

Cyber-attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web’s most popular cyber-attack maps. While the maps themselves are mostly eye candy with limited context, there are some creative ways they can be used.

Entrenched security professionals view cyber-attack maps with a somewhat jaded eye. They call them “pew pew” maps, mimicking a child-like sound to represent gunfire when playing with toys. In fact, one map actually uses these sounds to an amusing effect.

Some of the professionals CSO spoke with said they’ll pop one of the maps up on a screen in the SOC (Security Operations Center) if they know a client is coming in, but only because of the eye candy factor. In fact, most of the professionals said they’ve used them, but other than “performance art,” there isn’t any real value in them.

To read this article in full or to leave a comment, please click here

Click here for reuse options!
Copyright 2017 NETWORKFIGHTS.COM