The document discusses new security technologies used by Dell SecureWorks to detect cyberattacks. It describes advanced endpoint threat detection (AETD), which monitors endpoints like workstations and servers to detect anomalous activity that may indicate a threat. It also describes advanced malware protection and detection (AMPD), which uses sandboxing technology to analyze suspicious files and network traffic in isolated virtual environments. The article provides examples of how these technologies can quickly detect threats that have already infiltrated networks and help identify how attackers gained access. Traditional defenses alone are no longer sufficient, so these new behavior-based technologies provide important additional layers of protection.
The Cisco 2010 Midyear Security Report includes:
* Results and analysis from two new Cisco studies -- one focused on employee collaboration and the other on the concerns of IT decision-makers worldwide
* International trends in cyber-security and their potential impact on business
* Insight into how hackers penetrate ¡°soft spots¡± in enterprise security to steal sensitive data and sell it to the highest bidder
* An update on global spam trends since late 2009 and spam volume predictions for 2010
* Guidance from Cisco security experts to help businesses improve their enterprise security by 2011
The document discusses Micro-Electro-Mechanical Systems (MEMS) technology. It provides a brief history of MEMS beginning in the 1950s. MEMS devices combine electrical and mechanical components on a silicon chip through microfabrication. They are used as sensors and actuators in various applications like automotive airbags and inertial guidance systems. The document describes the manufacturing process for MEMS which uses techniques from semiconductor processing like deposition, lithography, and etching. It analyzes the social, economic, and ethical impacts of MEMS and discusses their growing use in consumer products.
This document is illegible as it contains random characters and symbols with no discernible words or meaning. It does not provide any information that can be summarized.
Romeo I. Poliarco has over 24 years of experience in electrical engineering for various commercial, industrial and residential building projects. He has expertise in electrical design, planning, cost estimation and project implementation. Some of the projects he has worked on include data centers, factory buildings, hospitals, schools, and infrastructure projects. He is proficient in software such as AutoCAD and Microsoft Office.
O documento descreve a evolu??o da tecnologia celular em telem¨®veis, desde as primeiras gera??es anal¨®gicas capazes apenas de chamadas de voz at¨¦ as modernas redes digitais 3G que permitem aplica??es multim¨ªdia. Tamb¨¦m explica brevemente como as ondas eletromagn¨¦ticas permitem a comunica??o sem fios e tanto os benef¨ªcios quanto os riscos potenciais do uso excessivo de telem¨®veis.
Anand Bhardwaj has over 7 years of experience in RF design, validation, and testing. He has expertise in areas such as RF system design, PCB design, WiFi/Bluetooth/Zigbee protocol testing, and antenna validation. Currently he works as an RF team lead at VVDN Technologies where he has led projects involving WiFi APs, Bluetooth modules, and Zigbee products.
Steward Funding is an independent finance broker operated by David Loft that provides commercial and personal funding solutions through an extensive panel of lenders in Australia. The company prides itself on structuring debt correctly and understanding commercial transactions. David Loft has over 20 years of experience in financial services and aims to create positive funding solutions tailored to his clients' needs. Steward Funding acts as a private bank manager by managing clients' financial reporting, liaising with banks, and ensuring the best funding options.
This document summarizes the HIV/AIDS research priorities and budget of the National Institute on Drug Abuse (NIDA). It discusses that in FY2013, 55% of NIDA's HIV/AIDS budget went to behavioral and social science research, while 16% went to natural history and epidemiology and 17% to etiology and pathogenesis. Key research priorities outlined include prevention through vaccines, microbicides, PrEP and behavioral interventions, treatment through more efficient antiretroviral therapy, and addressing co-infections and co-morbidities. The document also announces new funding initiatives for FY2015 and 2016 focusing on areas like substance use and HIV risk, prevention and treatment of HCV in high-risk groups
The site plan shows the layout of a city block bounded by Martin Luther King Jr Blvd, North Monroe Street, Northwood Blvd, and West Tharpe Street. It includes the locations of Raa Middle School, the post office, ProBank, Milano Pizza, Hooter's, McDonald's, El Jalisco restaurant, and a retail building, as well as a parking lot and management office.
The document discusses the risks of poor indoor air quality in UK homes, noting that 90% of time is spent indoors where various contaminants from sources like gases, building products, and mold can accumulate, leading to issues like toxic home syndrome with symptoms like sneezing and headaches for many occupants. Poor indoor air quality puts a large percentage of the population at risk of respiratory or dermatological conditions and mold issues are common in homes.
The article discusses upcoming enhancements to the (ISC)2 Certified Information Systems Security Professional (CISSP) and Systems Security Certified Practitioner (SSCP) credentials effective April 15, 2015. The SSCP exam content has been refreshed to better reflect the technical skills and competencies needed by security practitioners, organized into 7 domains. The CISSP exam domains have also been updated, with a continued focus on designing, implementing, and managing enterprise security programs while maintaining technical competence. The enhancements are meant to ensure the credentials remain relevant as technology and threats evolve.
Discover how cutting-edge software solutions can fortify your data against evolving cyber threats and ensure the confidentiality, integrity, and availability of your valuable assets. Join us to explore real-world examples, best practices, and actionable insights that empower you to take proactive measures in the face of ever-present security challenges.
This document outlines a recommended strategy for mitigating insider threats. It begins by discussing how insider threats can be just as dangerous as outsider threats. It then discusses how insider threats have traditionally received less attention than outsider threats. The document recommends forming a cross-functional team to assess insider risks, develop an insider threat mitigation plan, implement controls, and regularly review the program. The key is to understand who makes up the organization and their motivations in order to develop appropriate policies and technologies to mitigate risks from both malicious and non-malicious insiders.
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer
?
The document discusses advanced persistent threats (APTs), which are sophisticated cyber attacks conducted by well-resourced groups, often state-sponsored. APTs differ from typical attacks by establishing a long-term presence within a network to steal data over time rather than just causing quick damage. They pose serious risks as demonstrated by costly data breaches at companies like Target. Traditional security approaches are ineffective against APTs due to their adaptability and use of techniques like zero-day exploits. Organizations must prepare for inevitable breaches rather than just focusing on prevention alone.
Understanding Advanced Cybersecurity Threats for the In-House CounselAdam Palmer
?
The document discusses advanced persistent threats (APTs), which are sophisticated cyber attacks by well-resourced actors often sponsored by nation-states. APTs differ from typical cyber attacks in that they establish a long-term foothold within a company's network to steal data over time rather than carrying out single, quick attacks. The impacts of APTs can be substantial, as demonstrated by the large costs and losses companies like Target have faced. While prevention is important, the document emphasizes that companies must also focus on fast detection of threats and effective response plans since APTs are difficult to prevent fully given their resources and tactics like zero-day exploits. It provides advice for general counsels on understanding the APT threat
Romeo I. Poliarco has over 24 years of experience in electrical engineering for various commercial, industrial and residential building projects. He has expertise in electrical design, planning, cost estimation and project implementation. Some of the projects he has worked on include data centers, factory buildings, hospitals, schools, and infrastructure projects. He is proficient in software such as AutoCAD and Microsoft Office.
O documento descreve a evolu??o da tecnologia celular em telem¨®veis, desde as primeiras gera??es anal¨®gicas capazes apenas de chamadas de voz at¨¦ as modernas redes digitais 3G que permitem aplica??es multim¨ªdia. Tamb¨¦m explica brevemente como as ondas eletromagn¨¦ticas permitem a comunica??o sem fios e tanto os benef¨ªcios quanto os riscos potenciais do uso excessivo de telem¨®veis.
Anand Bhardwaj has over 7 years of experience in RF design, validation, and testing. He has expertise in areas such as RF system design, PCB design, WiFi/Bluetooth/Zigbee protocol testing, and antenna validation. Currently he works as an RF team lead at VVDN Technologies where he has led projects involving WiFi APs, Bluetooth modules, and Zigbee products.
Steward Funding is an independent finance broker operated by David Loft that provides commercial and personal funding solutions through an extensive panel of lenders in Australia. The company prides itself on structuring debt correctly and understanding commercial transactions. David Loft has over 20 years of experience in financial services and aims to create positive funding solutions tailored to his clients' needs. Steward Funding acts as a private bank manager by managing clients' financial reporting, liaising with banks, and ensuring the best funding options.
This document summarizes the HIV/AIDS research priorities and budget of the National Institute on Drug Abuse (NIDA). It discusses that in FY2013, 55% of NIDA's HIV/AIDS budget went to behavioral and social science research, while 16% went to natural history and epidemiology and 17% to etiology and pathogenesis. Key research priorities outlined include prevention through vaccines, microbicides, PrEP and behavioral interventions, treatment through more efficient antiretroviral therapy, and addressing co-infections and co-morbidities. The document also announces new funding initiatives for FY2015 and 2016 focusing on areas like substance use and HIV risk, prevention and treatment of HCV in high-risk groups
The site plan shows the layout of a city block bounded by Martin Luther King Jr Blvd, North Monroe Street, Northwood Blvd, and West Tharpe Street. It includes the locations of Raa Middle School, the post office, ProBank, Milano Pizza, Hooter's, McDonald's, El Jalisco restaurant, and a retail building, as well as a parking lot and management office.
The document discusses the risks of poor indoor air quality in UK homes, noting that 90% of time is spent indoors where various contaminants from sources like gases, building products, and mold can accumulate, leading to issues like toxic home syndrome with symptoms like sneezing and headaches for many occupants. Poor indoor air quality puts a large percentage of the population at risk of respiratory or dermatological conditions and mold issues are common in homes.
The article discusses upcoming enhancements to the (ISC)2 Certified Information Systems Security Professional (CISSP) and Systems Security Certified Practitioner (SSCP) credentials effective April 15, 2015. The SSCP exam content has been refreshed to better reflect the technical skills and competencies needed by security practitioners, organized into 7 domains. The CISSP exam domains have also been updated, with a continued focus on designing, implementing, and managing enterprise security programs while maintaining technical competence. The enhancements are meant to ensure the credentials remain relevant as technology and threats evolve.
Discover how cutting-edge software solutions can fortify your data against evolving cyber threats and ensure the confidentiality, integrity, and availability of your valuable assets. Join us to explore real-world examples, best practices, and actionable insights that empower you to take proactive measures in the face of ever-present security challenges.
This document outlines a recommended strategy for mitigating insider threats. It begins by discussing how insider threats can be just as dangerous as outsider threats. It then discusses how insider threats have traditionally received less attention than outsider threats. The document recommends forming a cross-functional team to assess insider risks, develop an insider threat mitigation plan, implement controls, and regularly review the program. The key is to understand who makes up the organization and their motivations in order to develop appropriate policies and technologies to mitigate risks from both malicious and non-malicious insiders.
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer
?
The document discusses advanced persistent threats (APTs), which are sophisticated cyber attacks conducted by well-resourced groups, often state-sponsored. APTs differ from typical attacks by establishing a long-term presence within a network to steal data over time rather than just causing quick damage. They pose serious risks as demonstrated by costly data breaches at companies like Target. Traditional security approaches are ineffective against APTs due to their adaptability and use of techniques like zero-day exploits. Organizations must prepare for inevitable breaches rather than just focusing on prevention alone.
Understanding Advanced Cybersecurity Threats for the In-House CounselAdam Palmer
?
The document discusses advanced persistent threats (APTs), which are sophisticated cyber attacks by well-resourced actors often sponsored by nation-states. APTs differ from typical cyber attacks in that they establish a long-term foothold within a company's network to steal data over time rather than carrying out single, quick attacks. The impacts of APTs can be substantial, as demonstrated by the large costs and losses companies like Target have faced. While prevention is important, the document emphasizes that companies must also focus on fast detection of threats and effective response plans since APTs are difficult to prevent fully given their resources and tactics like zero-day exploits. It provides advice for general counsels on understanding the APT threat
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
?
Juan Morales advises prioritizing vulnerability remediation by first identifying the critical assets that are most important to keeping the business running operationally and financially. It is important to understand where these key assets are located and have conversations with business stakeholders to obtain insight on the criticality of the assets. Quantifying risk to stakeholders in terms of potential system downtime and financial impact, such as revenue loss, can help communicate risk more effectively than simply stating the cost to fix a vulnerability. Visuals like charts and dashboards with trend lines are also effective for stakeholders to understand risk.
1. After a cyber attack, the organizational decision making and re.docxjackiewalcutt
?
1. After a cyber attack, the organizational decision making and response to the attack is critical to getting the organization through the incident and back to normal business after the attack. Please review and discuss the actions management should take prior to a cyber attack. Include in your discussion an overview of crisis management and the role it plays in recovery.
2. Business continuity plans (BCP) describe processes and procedures that an organization activates for any threat or issue that may prevent the organization from carrying on normal business. Examples include cybersecurity attacks, fire, flood, and other business disruption causes. Describe and discuss the main components of a BCP.
3. In traditional warfare, attacking communications and command and control functions are integral to victory. Attacking the systems that are the conduit of those critical functions are equally integral to victory. Discuss three offensive cyber attack technologies and when they should be deployed.
4. Within the US Government, no single department or agency has the ultimate responsibility for securing or responding against cyber attacks. Discuss an approach to building a coordination and collaboration comprehensive strategy across the federal government to reduce cyber security attacks.
UMUC, 2014. ( CSEC670) http://tychousa1.umuc.edu/CSEC670/1206/csec670_04/assets/csec670_04.pdf
UMUC Cybersecurity Capstone
CSEC670
? UMUC 2012 Page 1 of 38
Contents
Topic 1: Scenario ............................................................................................................................. 2
Scenario: The Christmas Fiasco .................................................................................................. 2
Topic 2: Module Introduction ........................................................................................................... 4
Topic 3: Decision Making in Response to Cyberattacks ................................................................. 5
The Decision-Making Process ..................................................................................................... 5
Determining the Appropriate Response ....................................................................................... 6
Crisis Management ...................................................................................................................... 7
The Elements of a Business Continuity Plan ............................................................................. 10
The Business Continuity Planning Process ............................................................................... 12
The Business Impact Analysis ................................................................ ...
1) Cybersecurity has become a major concern for boardrooms as data breaches are increasingly common and costly. The FBI has warned that data breaches increased 400% in recent years.
2) Effective cybersecurity requires a company-wide effort overseen by leadership. It is no longer just an IT issue but a business risk that must be addressed from the top down.
3) To properly advise CEOs and boards, cybersecurity experts must understand the true threats including nation-state attacks and opportunistic hackers, and recommend risk-reducing strategies in business terms palatable to non-technical leadership.
Managing Corporate Information Security Risk in Financial InstitutionsMark Curphey
?
The document discusses information security risk management in financial institutions. It begins by asking if the reader has ever been hacked and discusses the components of a typical security program. It notes that security programs should focus on facilitating the business rather than just securing systems. The document then discusses how security risk is calculated based on vulnerabilities, threats, and business impact. It outlines the evolution of information security maturity from 1998 to 2006, showing a shift from reactive approaches to more proactive continuous improvement processes. Finally, it leaves the reader with some brief security-related tips and sayings.
The disappearance of the network perimeter is the greatest security challenge according to one expert. Traditional network boundaries have been eroded by cloud services, mobile devices, and remote work access. This lack of a defined perimeter makes it difficult to know all assets and users on the network. Another issue is the use of unknown cloud services by employees that expose company data without IT oversight. To address this, companies need accurate asset inventories, security policies for all assets and services, and security awareness training for employees. The goal is minimizing risks so businesses can focus on their main operations.
Mobility and security are important factors that need to be prioritized by fintech startups in building user trust.
This presentations shares how to build, develop, and improve these two things so that your business can grow.
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
?
This book is your guide to helping you detect and prevent social engineering attacks, and to better understand how to defend your company from what has grown to become the dominant global cyber threat.
The Marketing Technologist: Neo of the Marketing Matrixion interactive
?
The document discusses the rise of "marketing technologists" - marketers who understand technology. It tells the story of Mayur, who started as a software developer but ultimately became the Global Head of Marketing Technology & Innovation at a company.
It argues that in today's digital world, controlled by software, marketing needs people who can understand and wield technology natively. It proposes a new role, Chief Marketing Technologist, to own marketing's technology mission. This role would report to the CMO but also partner with the CIO. The goal is for marketing to have the right balance of technology expertise and authority.
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
?
The COVID-19 pandemic challenged organizations' security operations in significant ways by shifting workforces largely to remote environments. This changed the typical infrastructure topology protections and required a new focus on individual endpoints. Experts recommend organizations identify gaps by evaluating how the changes have impacted connectivity, communications, and collaboration capabilities. They also advise reassessing threat models, attack surfaces, security tools, and operations to ensure no new blind spots were introduced by the shift to remote work. Being able to proactively identify gaps is critical for organizations to build resilience against evolving threats.
This document summarizes interviews with cybersecurity professionals about the current state of cyber risks. The interviewees discuss how senior leaders' understanding of cyber risk has improved but still faces challenges from technical complexity and uncertainty. The biggest barriers to protection are underfunding security and lack of user awareness training. A "bad day" would involve a major data breach or systems outage. The threats of organized crime, state-sponsored attacks, and exploiting human weaknesses will continue to evolve rapidly. Information sharing and early education are opportunities to stay ahead of this threat.
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ? MBA
?
- Internal threats are more dangerous than external ones, as 60% of attacks in 2016 were by insiders with malicious or negligent intent. Healthcare, manufacturing, and financial services are most at risk due to valuable personal data.
- Electronic medical records can be worth over $1300 each to hackers, who can use stolen health information to commit lifetime blackmail or fraud. Insider threats are the largest risk.
- There are many approaches to minimize potential insider threats, including strict access controls, monitoring for anomalies, social engineering tests, awareness training, and separating duties. Prioritizing security is crucial to protect valuable data and systems from internal and external threats.
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
?
For years, security researchers and leaders have warned: ¡°The mobile threat is coming.¡± Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities¡ªwith an increasingly mobile workforce and patient population¡ªare square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017?
This interview with BlackBerry VP Government Solutions Sinisha Patkovic, on Mobile Security: Preparing for the 2017 Threat Landscape, was produced for of a recent ISMG Security Executive Roundtable sponsored By BlackBerry.
Vice President, Cybersecurity Director & Global Chief Information Security Officer at Groupe SEB ¨C a global market leader in the small household equipment sector, including prestigious brands: Krups, Rowenta, Tefal, Supor, WMF, Emsa, Calor, Moulinex¡ and is present in 150 countries.
St¨¦phane Nappo is an internationally recognized cybersecurity leader and a senior-level cybersecurity executive with over twenty-five years of experience in international finance, banking, digital services, and industry.
Formerly: Global Chief Information Security Officer at Soci¨¦t¨¦ G¨¦n¨¦rale International Banking and Financial Services (responsible for cybersecurity of 40 major banks in 67 countries); Group Information Security Officer at OVHCloud, the European leader in cloud computing, with a presence in 138 countries; Head of Cybersecurity Consulting department for Banking and Finance at VINCI, a world leader in concessions, energy, and construction, with operations in 120 countries. Throughout his career, St¨¦phane has taught, trained, and worked with hundreds of talented cybersecurity professionals.
Named Global CISO of the Year, and awarded the European Excellence Trophy in Digital Security in 2018, St¨¦phane Nappo was chosen as the Global Security Executive Influencer by the prestigious IFSEC Global and ranked as one of the Top Five Influential French IT & Cybersecurity expert by FORBES for the Year 2021.
Actively supporting diversity and Women in Cyber, Mr. Nappo was named Ally of the Year 2021 by the United Cybersecurity Alliance USA.
Passionate for innovation and business¡¯ digital protection, his leadership skills have been recognized throughout the world. His articles and renowned quotes are being cited in numerous books by leading experts and publishers.
The Next Great Challenge for CISOs
I am honored to be recognized! Cybersecurity is truly a team effort at a strategic level, either we all work together or the threats will tear us down piecemeal! Every person, no matter their role, can play an important part in making digital technology trustworthy and keeping the Internet secure, private, and safe.
1. T h e M a g a z i n e f o r i T M a n a g e r s i n T h e W o r l d ¡¯ s l a r g e s T M u lT i P l aT f o r M e n T e r P r i s e s
2016: Issue 2
www.enterprIsesystemsmedIa.com
An
Enterprise Systems Media
Publication
Are You Ready
for an Attack?
How Dell SecureWorks Is Helping
Keep Organizations Safe
Welcometothelatestissueof
EnterpriseExecutive!
T H E M A G A Z I N E F O R I T M A N A G E R S I N T H E W O R L D ¡¯ S L A R G E S T M U LT I P L AT F O R M E N T E R P R I S E S
2016: ISSUE 2
WWW.ENTERPRISESYSTEMSMEDIA.COM
2. 2016: Issue 2 | Enterprise Executive | 27
E
nterprise Executive recently caught up
with Jeff Multz, director and general
manager of Japan for Dell SecureWorks,
to get an update on security technology,
and to see how threats are changing,
how to be protected and what to do if
your network has been compromised.
Jeff writes an article for each issue of
Enterprise Executive, reviewing a wide
spectrum of security issues. He is a renowned
cybersecurity expert who presents live talks
and best practices throughout the world. So
far, he has had more than 200 articles
published on a variety of security topics.
Enterprise Executive: What are the latest
advances in security technology?
Jeff Multz: The new technologies focus on
behavior in your network to detect anomalous
activity as soon as it starts. The two that stand
out the most are technologies that monitor
and analyze activity on your endpoints
(workstations, laptops and servers) and
technologies that monitor advanced malware
and threats in your network and email traffic.
The former helps you spot anomalous activity
on your endpoints as soon as it begins and
analyzes forensics to understand when the
threat entered, what the attacker was seeking
and how he got in. The latter helps you
monitor and analyze suspicious inbound and
outbound web and email traffic to detect
advanced threats entering and leaving your
network. Traditional network defenses are no
longer enough to protect a network.
EE: What are those traditional defenses, and
do you still need them?
Multz: Traditional defenses include: firewalls;
antivirus (AV) technologies, such as software
and Intrusion Detection Systems/Intrusion
Prevention Systems (IDS/IPS); access control
lists, which permit or deny network traffic
based on lists that state where the traffic is
coming from or where it is directed; and Virtual
Private Networks (VPNs), which use passwords
and encryption to allow someone working from
outside the network, such as in a caf¨¦ or at an
employee¡¯s home, to connect to the network.
In the past, malware was fairly simple.
Now, I¡¯m simplifying this to make it easy to
understand, but basically, malware, also
known as malicious software that can harm
a computer, is made up of code. So, let¡¯s say
I create a piece of malware whose code is
How Dell SecureWorks
Is Helping Keep
Organizations Safe
ByDennyYost
3. 28 | Enterprise Executive | 2016: Issue 2
<123ABC> and is designed to steal your
passwords whenever you go to a banking
website. If I send you an email and you click
on the link or attachment that is affiliated
with that email, either the link or the
attachment will automatically download that
code onto your computer, and you¡¯ll have no
idea that it happened. Once that code gets into
your computer, each time you go to a banking
website, it steals your login credentials and at
some point the malware will connect back to
my computer and will send me all your login
credentials to all your banking websites. If I
keep using this same malicious code, at some
point security companies will recognize that
<123ABC> is a bad thing and must be
blocked. Once they write code that blocks my
code, when I or another threat actor sends you
an email with that code embedded in it, your
email security service would block that email
from ever getting to you. Instead of infecting
you via an email, a threat actor could also
embed that malicious code onto a legitimate
website he hacked without the owner even
knowing. For example, if an attacker hacked
into a retail website, he could create malware
that downloads when you click the link that
says Pants. When a user clicks on the link, it
downloads <123ABC>. But if your AV
technology has that code built into it, the code
will be stopped from downloading when a
user clicks on it.
EE: How has the malware changed since then?
Multz: For one thing, malware now is often
polymorphic, which means it changes once it
enters your system. The malware embedded
into the Pants link could actually be
<901299>, but once it enters a computer it
changes to <123ABC>. The people who create
AV have created code that saw <123ABC> was
bad and created software, which blocks that
code from entering a computer, but <901299>
is not blocked and that is what is going to be
downloaded onto a computer when a user
clicks on the link.
There are lots of estimates out there about
how much new malware is created each day.
I¡¯ve seen the figure as high as 100,000. For
argument¡¯s sake, let¡¯s just say there are only
10,000 new pieces of malware created each
day. AV makers can¡¯t reverse engineer 10,000
pieces of malware each day to discover what
the code is and then create new code to block
it. Even if they could do that, the first time
malware is created, it is going to slip by AV
because no one yet knows it¡¯s bad because it
has never been seen before.
What¡¯s more, the attackers are now finding
ways to get inside networks without even
using malware by obtaining people¡¯s login
credentials. For example, an attacker might
send Sally at your office a phishing email
saying a certain department at her job needs
her to update some information. Sally¡¯s a
diligent employee who tries to be efficient, so
she abides by the request and clicks on a link
to update the information. That link doesn¡¯t
download malware, but it takes her to a sham
web page that is built to look as if it is
affiliated with a trusted company¡ªperhaps
her own company¡ªand instructs her to use
her work login credentials to update her home
address and phone number.
Once Sally logs in with her username
and password, the attacker saves that
information. Then, depending upon how the
network is set up, the attacker might be able
to access her computer remotely and sign in
as Sally. No malware is needed. Now, the
attacker can use Sally¡¯s computer remotely
to peruse any files she has access to. Again,
depending upon how the network is set up,
from her computer the attacker might be
able to get the network administrators¡¯
credentials, then the attacker has access to
the entire network, far more files than even
Sally could access. If Sally¡¯s company¡¯s
network were set up with strict security
controls, even if she did fall for that phishing
email, the attacker might never be able to do
anything with her login credentials because
he would have no access to her computer.
4. 30 | Enterprise Executive | 2016: Issue 2
Very few companies have their networks set
up in the best possible way, which leaves them
open to attacks. That¡¯s why we recommend all
organizations meet with a security consultant
who is part of a cybersecurity company that
has architected hundreds of networks because
that person is going to know the tricks
attackers use and the settings that need to be
set to block them. Most likely, Sally¡¯s company,
if it is like most companies, is not set up to
block the numerous ways hackers can enter
the network. However, no blocking technology
is failsafe. That is why you need to monitor
and analyze suspicious inbound and outbound
web and email traffic to detect advanced
threats entering and leaving your network,
and suspicious activity on your endpoints.
EE: So, how do the new technologies work?
Multz: They work by spotting anomalous
activity that has already gotten inside your
network. This is important because it
normally takes months before a company
even knows a threat is inside its network,
according to a report last year by the
independent research company Ponemon.
If you can recognize within one day that a
threat is inside your network, imagine all the
money and resources you save by getting that
threat out of your network before an attacker
has had time to gather information and then
send it to a server he has access to. Security
experts and regulatory agencies, such as the
Payment Card Industry Data Security
Standard (PCI DSS) and HIPAA, say you
must monitor your network 24x7x365 to spot
threats immediately and get them out of your
network before they have time to create
damage. That¡¯s still important, but network
monitoring only monitors devices that
produce log data, such as servers, firewalls,
routers and IDS/IPS devices. Since endpoints
don¡¯t output logs, organizations could go for
months without ever realizing an endpoint
has been compromised, possibly giving an
attacker time to access the entire network.
Advanced Endpoint Threat Detection
(AETD) is a service that alerts you when
there is anomalous activity on your endpoints.
That alert may happen as soon as something
malicious is downloaded onto the device or
when mischievous activity begins.
Organizations have a baseline of normal
activity on computers. When that baseline has
been established, when something strays from
the norm, an alarm goes off so the service
provider¡¯s security analyst can research the
activity. If the activity seems suspicious, the
analyst has access to something similar to a
flight recorder that tracks every step the
threat actor has made since entering the
network. If the analyst believes there is a true
threat in your network, he can show you all
changes the attacker made to the registry, or
basic operating files, as well as all other
changes the attacker made to your computer
or network. If the attacker had created a
¡°backdoor,¡± also known as a secret way to get
back inside your computer, just in case you
were to find his existence and kick him out of
your network, the analyst would be able to see
that backdoor so that you could close it and
the attacker could not return. An analyst
would also be able to tell you how the attacker
got inside in the first place, then you could
implement countermeasures so it wouldn¡¯t
happen again.
EE: How does that differ from the other
new technology?
Multz: Now, the other new technology that
companies should also implement is Advanced
Malware Protection and Detection (AMPD).
AMPD tracks traffic and emails going in or
out of the network in a technology called a
¡°sandbox,¡± which is a computing environment
that is isolated from the network and operates
virtually to test ways in which the malware
might perform. Applications, or code, in this
case malicious code, can be executed in the
isolated environment without harming a real
computing device that is part of the network.
5. 32 | Enterprise Executive | 2016: Issue 2
It works like this. An attacker sends a
piece of malicious code to a computer or
server. An exact copy of that same code
goes to the sandbox. In a good sandbox
the malware will detonate, and as soon as
anomalous activity is spotted, an alarm goes
off, notifying a security researcher who will
analyze the activity and the malware. The
analyst will contact the victim¡¯s company to
let it know of the malware and can help the
company with remediation. Earlier, I talked
about how malware has changed in the past
couple of years. Attackers know companies
use sandboxes, so a lot of malware is created
that does nothing unless it thinks it is inside
a real computer. The attacker doesn¡¯t want
his malware to detonate in a sandbox
because then the victim will know malware
has gotten inside his computer, and the
malware will be removed quickly, prohibiting
the attacker from gathering information. So,
attackers have created malware that only
detonates if the malware believes it is inside
a real computer. For this reason, it is
important to know the type of sandbox your
provider is using. We use one that is created
with a CPU, which is the brains of a
computer, so that the malware thinks it is
inside a real computer and detonates,
allowing an analyst to see exactly what the
malware did. Whatever it did in the sandbox,
it did or will soon take the same action in
your real computing environment. AMPD
also watches activity that is sent outside the
network. If the attacker got inside your
network without using any malware and
starts sending files outside the network, that,
too, would create an alert because AMPD
catches anomalous outbound traffic.
Those are the latest advances in technology.
As attackers change their tactics and
procedures, new security advances will
continue changing to stop them. EE
Denny Yost has more than 30 years of mainframe and IT
experience. He is the associate publisher and editor-in-
chief of Enterprise Executive and associate publisher of
Enterprise Tech Journal.
Email: denny@esmpubs.com
¡°Attackers know companies
use sandboxes, so a lot
of malware is created
that does nothing
unless it thinks it is
inside a real computer.¡±