web analytics
364 NEWS
No Result
View All Result
Thursday, May 26, 2022
  • Login
  • Home
  • World
  • Economy
  • Business
  • Markets
  • Tech
  • Real Estate
Subscribe
364 NEWS
  • Home
  • World
  • Economy
  • Business
  • Markets
  • Tech
  • Real Estate
No Result
View All Result
364 NEWS
No Result
View All Result
Home Tech

Security Think Tank: Defenders must get out ahead of complexity

by admin
May 7, 2022
in Tech
0
Security Think Tank: Defenders must get out ahead of complexity
152
SHARES
1.9k
VIEWS
Share on FacebookShare on Twitter

The modern-day abundance of platforms, apps and IT tools presents malicious actors with a web of interconnection that is easily exploited to move rapidly through the network to compromise critical assets. Security teams need to better understand these attack pathways to fight back

By

  • Jack Chapman

Published: 04 May 2022

Over the past two years, organisations have experienced a quantum leap in digitisation, adopting an array of new technologies to facilitate remote and hybrid working. Consequently, they are dealing with a more complex technology stack than ever before, which introduces new vectors for cyber criminals to exploit.

In a landscape of heightened cyber threat, regulators worldwide, including the UK’s National Cyber Security Centre (NCSC), have advised organisations to build cyber resilience, but this task is more complex than ever. The interconnection between technologies enables hackers to maximise the impact of their attacks by moving through an organisation’s networks in search of the most valuable assets to exploit.

It’s vital for security teams to begin to understand this threat. Identifying attack pathways can be difficult, but it’s important to note that hackers invariably seek the path of least resistance to attack systems. This means leveraging known credentials and available connections between one system and another, which are often natively available within a network. Where an attack pathway is identified, security teams must drill down and inspect whether these lead to critical assets or other exposed parts of a network.

Security teams must also understand the technologies employed across an organisation and seek to identify vulnerabilities that can be “chained” to build a path. By scanning source code for vulnerabilities, conducting penetration testing of products and services, and working closely with a security operations centre (SOC) to monitor logs of network events across an entire infrastructure, security teams can identify potential vulnerabilities and proactively monitor malicious activities at the perimeter of an organisation’s network.

“If you’re not sure, seek advice. Cyber security is a vast space and you can’t know everything. It’s better to ask for help than to leave the door open for an attack”
Jack Chapman, Egress

Vulnerabilities in software are regularly published as Common Vulnerabilities and Exposures (CVEs). While attackers will begin to develop exploits of identified weaknesses, it is essential that security teams work at pace to identify these attack windows before a pathway is formed.

For future implementations, it’s important to get ahead of the risk. The first step is to ensure that, when new solutions are being considered, the security team is involved from the very beginning. Educate IT teams and users in the importance of security considerations and build processes that ensure your team has a seat at the table from day one. By involving security teams early, organisations can audit new technologies for vulnerabilities before adding them to the network.

IT teams should also adopt the principle of least privilege when it comes to their tech stack. To more effectively facilitate this, organisations can also look into adopting privilege access management (PAM) tools to control, monitor and audit permissions. In addition to this, secure endpoints by removing local admin rights, and implement continuous controls monitoring to ensure that existing technology is configured correctly to reduce the risk of vulnerabilities.

Consider the pathways an attacker may take through your various systems and implement layered security to minimise the paths available. Think of it like the Swiss cheese principle – you want to create a series of barriers. Attackers may make it through one or two of these, but the more layers there are, the lower the chances of them making it all the way through. Important elements to consider are tools to prevent distributed denial of service (DDoS) attacks, phishing, malware and data loss prevention. Also use pen testing to identify and patch vulnerabilities.

My final piece of advice for organisations – and security teams – is this: If you’re not sure, seek advice. Whether that’s from your peers in the security sector, the provider of your technology, or from external cyber security consultants. Ultimately, cyber security is a vast space and you can’t know everything. It’s better to ask for help than to leave the door open for an attack. If you follow these steps, your organisation can begin to make sense of its complex technology ecosystem and build up its security posture.


Jack Chapman is vice-president of threat intelligence at Egress.





Read more on Network security management


  • Security Think Tank: Solving for complexity in the network

    By: Mike Lloyd


  • Updated cyber security regulations proposed for managed services sector

    By: Alex Scroxton


  • Low-complexity CVEs a growing concern

    By: Alex Scroxton


  • 5 cybersecurity lessons from the SolarWinds breach

    By: Sandra Gittlen

Read More

Tags: SecurityThink
  • Trending
  • Comments
  • Latest
Does omicron cause unusual symptoms?

Does omicron cause unusual symptoms?

December 13, 2021
One person dead following incident at SilverStar Mountain Resort

One person dead following incident at SilverStar Mountain Resort

December 20, 2021
Edmonton Police helping families in need through Holiday Heroes campaign

Edmonton Police helping families in need through Holiday Heroes campaign

December 20, 2021
Amazon staff had to use bathrooms as tornado shelters

Amazon staff had to use bathrooms as tornado shelters

December 13, 2021
Hashtag Trending Dec. 8 – Massive numbers of YouTube copyright strikes; Microsoft seizes hacker’s servers; Outage at AWS

Hashtag Trending Dec. 8 – Massive numbers of YouTube copyright strikes; Microsoft seizes hacker’s servers; Outage at AWS

0
With Stimulus Benefits Ending, What Should Small Business Owners be Aware of?

With Stimulus Benefits Ending, What Should Small Business Owners be Aware of?

0
7 Ways to Be a Truly Customer-Focused Business

7 Ways to Be a Truly Customer-Focused Business

0
Assumptions Can Hold Your Company’s Success Hostage. Here’s How to Fight Them

Assumptions Can Hold Your Company’s Success Hostage. Here’s How to Fight Them

0
Beto O’Rourke Confronts Gov. Abbott At Texas Shooting Press Conference

Beto O’Rourke Confronts Gov. Abbott At Texas Shooting Press Conference

May 26, 2022
Most Voters Want Congress To Pass Stricter Gun Laws, Poll Finds

Most Voters Want Congress To Pass Stricter Gun Laws, Poll Finds

May 26, 2022
Josh Duggar From ‘19 Kids And Counting’ Sentenced To Over 12 Years In Prison For Child Porn

Josh Duggar From ‘19 Kids And Counting’ Sentenced To Over 12 Years In Prison For Child Porn

May 26, 2022
Pfizer Offers Low-Cost Drugs And Vaccines—Including Covid Treatments—To World’s Poorest Countries

Pfizer Offers Low-Cost Drugs And Vaccines—Including Covid Treatments—To World’s Poorest Countries

May 26, 2022
  • Home
  • Advertisement
  • Contact Us
  • Privacy & Policy
  • Other Links

© 2021 364News - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Advertisement
  • Contact Us
  • Homepages
    • News 364
  • World
  • Economy
  • Business
  • Opinion
  • Markets
  • Tech
  • Real Estate

© 2021 364News - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In