By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Tech Insight
  • Digital
  • Software
  • Infrastructure
  • Security
  • Data
  • Cloud
  • Research Center
Reading: Ali, Foreman, and “The Rumble in the Jungle”
Tech InsightTech Insight
Font ResizerAa
Search
Have an existing account? Sign In
Follow US
© 2024 Tech Insight, a Talk About Tech brand. All rights Reserved.
Tech Insight > Cyber crime > Ali, Foreman, and “The Rumble in the Jungle”

Ali, Foreman, and “The Rumble in the Jungle”

John Connor
John Connor Cyber crime
Share
4 Min Read
cybersecurity experts
SHARE

All the boxing world can talk about nowadays is the upcoming Mayweather-McGregor fight. The highly anticipated match-up will undoubtedly bring in millions upon millions of dollars, a hefty portion of which will be pocketed by both participants–win or lose. It will hopefully be an entertaining fight–unlike the Mayweather-Pacquiao duel–as the two legends duke it out in a traditional boxing ring. However, it is hard to imagine this fight eclipsing the greatness of world famous boxing matches of the past. Take for instance the 1974 “Rumble in the Jungle” where Ali took the favored Frazier to eight rounds before putting him on his back with a devastating right hand. Frazier looked unstoppable, and Ali looked unbeatable–though the exact opposite proved to be the case. In many ways, the fight between cyber criminals and cyber security experts is panning out in a similar way. With the onslaught of cyber attacks in this year alone, it looks like cyber criminals have the upperhand. But some cybersecurity experts are taking a page out of the Greatest’s Playbook, floating like a butterfly and stinging like a bee.

The First Rounds Aren’t Looking too Great

It comes as no surprise that 2017 hasn’t been a great year for cybersecurity experts. There have been a seemingly countless number of attacks, ranging from the infamous Wanna Cry virus to cases of blockchain hacking that have left cyber victims suffering. One report sums it up well, “[it is] no longer enough to simply implement incident response solutions. Today’s threats require a dedicated team of security experts to maximize these tools with dynamic, continuously updated threat intelligence.” The current landscape has left many wondering how to combat the increasingly complex threats facing the common computer user.

Some cybersecurity experts have made themselves available for dialogue, in an attempt to help the everyday layman grasp what’s going on behind the scenes. One such person is Mike Oppenheim, the global research lead for IBM’s X-Force IRIS (Incident Response and Intelligence Services). In a recent interview, Oppenheim commented that the attacks that have happened so far “really highlight the need for visibility within networks and underscores the need for companies to have a good incident response plan so that they know how to respond in the face of these huge global incidents.” It is not enough to react to attacks–companies and firms need to learn how to detect and neutralize hostile threats. The team that Oppenheim leads is “on the ground” when attackers are active, allowing them to gather a large amount of data. Because of their data collection efforts, the team creates a “really good response service to try to figure out root cause analysis and also stop attackers from actually accomplishing their goals.”

Like a great boxer, IRIS is able to study and analyze the movements of cyber attackers. Then, in a quick counterpunch maneuver, cybersecurity experts at IRIS can both fend off the attack and shut it down. Another encouraging aspect of the developments of IRIS is its expansion to IBM products. Undoubtedly the end goal is not just an improvement in IBM Security Services, but advances in IBM’s specific products and ultimately cybersecurity as a whole. Though it seems like cyber criminals have the upper hand, cyber security experts hope to stand over their opponents and declare “I am the greatest.”

TAGGED:cyber crimeCyber DefenseCyber SecurityCyberattacks

Sign Up For Our Newsletter

Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Twitter LinkedIn Reddit Email Copy Link
Previous Article management ai software AI and The Manager of Tomorrow
Next Article bitcoin cash What the Heck is Bitcoin Cash?

Popular Posts

50 cent and bitcoin

What do 50 Cent and $8 Million Have In Common? Bitcoin.

TechAdmin 3 Min Read
Nvidia Chips Take Center Stage for Saudi Arabia and UAE

Saudi Arabia and UAE’s Bid in the AI Arms Race: Nvidia Chips Take Center Stage

Conal Cram 4 Min Read
KaarTech

KaarTech Raises $30M for Digital Expansion: Aiming for Public Listing

Conal Cram 3 Min Read
Broadcom Trident 4-X7

Broadcom’s Trident 4-X7: Powering the Future of Enterprise Data Centers

Conal Cram 3 Min Read

From our research center

KnowBe4 Africa (Pty) Ltd

10 Questions Every CISO Should Ask About AI-Powered Human Risk Management Tools

AI is transforming security awareness—but how much is marketing hype versus genuine value for your organisation? Human risk management (HRM) and security awareness vendors of...

Read content
  • About us
  • Contact us
  • Research Center
  • Disclaimer
  • Privacy
  • Terms & Conditions

We Are Tech Insight

We have been delivering breaking news from the tech world since 2017. Our goal is to help you stay up-to-date with the latest developments, trends, and breakthroughs in the tech world.

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site..

Read our privacy policy for more information.

© 2025 Tech Insight, a Talk About Tech brand. All rights Reserved.

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?