American Security Today's 2016 CHAMPIONS EDITION Digital Magazine AST 2016 CHAMPIONS EDITION | Page 90

Cyber Security & Packet Capture : Making the Connection
Volume 9
ing out globally .
Europe , Australia , China , Indonesia , and several other countries have mandated implementation dates for ADS-B and countries like Vietnam , Sri Lanka , and Singapore have already mandated that planes carry and use the technology .
Champions Edition

Cyber Security & Packet Capture : Making the Connection

Guest Editorial by Peter Ekner , Chief Technical Officer , Napatech
Malaysia Airlines flight 370 was carrying an ADS- B transponder but data received from the plane was sparse as it traveled over open ocean .
The goal of tracking initiatives and services like Spire AirSafe are to make incidents like MH370 a thing of the past .
For Spire Global updates and webinar opportunities , sign up at : http :// ardus . at / webinar .
‘ In the ever-increasing battle against critical data breaches , deploying packet capture capabilities is an extremely effective weapon .’ Peter Ekner , CTO , Napatech
Yahoo recently suffered a major data breach in which a copy of undisclosed information on 500 million user accounts was stolen .
Spire Global , Inc . is a leading player in the nanosatellite sector , building the world ’ s most advanced , constantly refreshed constellation .
In an industry that is used to measuring development periods in years , Spire has accelerated timelines to a period of just weeks .
Spire ’ s solutions offer organizations insights into aircraft tracking , weather & climate , shipping & supply chain and maritime domain awareness .
This network of nanosatellites senses the 3 ⁄ 4 of the planet inaccessible to most current systems which rely largely on land-based remote sensing .
Though detailed information on exactly what happened is yet to be revealed , previous data breach incidents tell us that the investigation will be complex and time-consuming .
What makes cyberattacks so tricky is that there isn ’ t a traditional , physical crime scene where evidence can be collected for investigation . Instead , we are facing a crime scene built from a complex structure of servers , networks and applications , scattered across many different geographical locations .
Another hindrance to cyber security forensics is 90