. "Identifying the source of an attack is possible if companies analyze the right types of information, he said." . . .