In this episode of the podcast: Chris Camacho of Flashpoint* joins us to talk about “the deep web” and “the dark web.” Chris and I talk about how companies like Flashpoint monitor the dark web for intelligence and, then, how companies are able to operationalize that intelligence as part of their security and incident response programs.
We hear a lot of talk about the “dark web” or the “deep web” these days: shadowy nether regions of the Internet – beyond the reach of Google’s crawlers. These un-indexed and often password protected sites are where cyber criminals, terrorist groups, drug dealers, hacktivists, and nation state actors and privacy extremists congregate, chat, plot and do business.
But what is the deep and dark web, exactly? And what value does the information gathered there have to a security-conscious organization? Just as important: how can organizations that benefit from this kind of threat intelligence operationalize it to put them a step ahead of malicious actors and targeted attacks?
Those are questions we posed to our guest this week: Chris Camacho is the Chief Strategy Officer at Flashpoint. In this podcast he and I talk about what people are referring to by the deep web and dark web, how companies like Flashpoint monitor the dark web for intelligence and, then, how companies are able to operationalize that intelligence as part of their security and incident response programs.
Far from being a bleeding edge service, threat intelligence is becoming a critical and even required component of mature information security programs, Camacho tells me.
(*) Flashpoint is a sponsor of The Security Ledger. For more information on how Security Ledger works with its sponsors and sponsored content on Security Ledger, check out our About Security Ledger page on sponsorships and sponsor relations.