Skip to main content

Posts

Showing posts from January, 2018

Attacker point of view

Real data, real attacks Unlike many of these types of industry reports, our findings are based on actual deployments, in real customers. We don’t scour the headlines to see what attacks were most prevalent, or ask trade show attendees what their biggest concerns  might  be. Need to monitor breach methods in real production environments, then takes the anonymized data and highlights what attacks are best at thwarting or bypassing security, as well as other key trends. Defense-in-depth is dead? It appears most companies maintain a strong focus on perimeter security for network-based attacks, but aren’t doing much to prevent malicious file transfer at the network level. It would appear that file-level scanning is pushed all the way down to endpoints only, negating the defense-in-depth strategy of having multiple layers of protection across the kill chain. Additionally, we saw a high-level of successful attacks which were able to move laterally once inside networks. In f...

Emerging Cybersecurity Solution Requirment

Blockchain for IT security.  Blockchain technology enables data storage in a decentralized and distributed manner, which eliminates a single point of failure and prevents hackers from compromising large volumes of data. Due to its ability to quickly identify the data that has been manipulated, blockchain may become the core technology for highly regulated industries, like banking and law. Continuous Adaptive Risk and Trust Assessment.  Since protection against behind-the-perimeter attacks is not sufficient today, Continuous Risk and Trust Assessment Approach (CARTA), which sees security as a continuous process that changes all the time and has to be regularly reviewed. Real-time assessment of risk and trust will enable organizations to make better decisions regarding their cybersecurity posture and mitigate the risks associated with aberrant user activities. Demand for advanced analytics.  Because security software generates massive amounts of data, organizations need...