sb-nz logo
Story image

Businesses face 'cyber black holes' without complete visibility

23 Mar 2018

Cyber attacks may seem unpredictable but high-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.

That’s according to the team at ForeScout, who believes that cyber attacks new and old aren’t so different.

“Three of the biggest cyber incidents in the last 12 months have come from the invisible network or IoT breaches,” comments ForeScout’s chief marketing officer Steve Redman.

Although he doesn’t explicitly name those breaches, he believes that organisations are getting swallowed up in a ‘black hole’ caused by a lack of visibility.

“Companies spend millions on security but can’t see the last mile. There’s a black hole that’s big enough for cybercriminals to take advantage of and traditional cybersecurity methods simply cannot keep pace,” Redman says.

The company cites Gartner’s long-advocated ‘adaptive security architecture’, which provides continuous security and visibility into different layers.

“Security leaders must shift their mindset from incident response to continuous response, spend less time on prevention and invest in detection and response,” Gartner explains in a Smarter with Gartner blog post.

“Context-aware networks are able to provide multiple sources of information that security professionals can use to determine if an attack is taking place. Enterprises should architect for comprehensive, continuous security to provide visibility across different layers for future security.”

Because organisations can’t protect what they can’t see, ForeScout says network visibility has never been more important.

Siloed security approaches lack complete visibility into risks including orphan virtual machines, rogue software installations, and connected devices.

ForeScout believes that the days of a simple and standardised IT infrastructure are long over. The new era is about cloud, software-defined networking and the Internet of Things.

The company says that regardless of where devices and data are located, organisations must understand who has access to that data, where that data resides, and what is running on the network.

“Defence in depth has been a prescribed cyber best practice for years, however multi-vendor environments quickly increase complexity and management overhead. Something as simple as a missing or broken agent can mean gaps in visibility and control of endpoint and devices. This creates cyber blind spots, which are prime targets for hackers,” Redman says. “Visibility can shine a light on these devices and close cybersecurity hygiene gaps. Poor network visibility and slow response to cyber threats can be corrected by implementing a unified cybersecurity framework for accurate network intelligence,” he concludes.

Story image
Cybersecurity budgets still not keeping up with threats — report
Executive teams are failing to recognise the level of damage cyber-threats pose to organisations, according to Sophos — many of them taking a ‘conservative approach’ to cybersecurity expenditure.More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
From Me to We: Partnerships & multiparty systems in the post-COVID-19 age
MPS is all about sharing data infrastructure between people and organisations - think along the lines of blockchain, distributed databases and ledgers.More
Story image
Fujitsu, Trend Micro team up to secure private 5G
"We believe that this security solution represents a key technology for applying private 5G to mission-critical areas."More
Story image
Enterprises underutilising security tools, causing teams to burn out
The report unveiled a lack of meaningful ROI metrics when reporting on security progress, as well as disparate opinions on objectives, tool effectiveness and security awareness amongst the organisation between executives and operations on security teams.More
Story image
Combine endpoint privilege management with these tools for maximum protection
By integrating an EPM solution with additional technologies, teams can manage the entire security tool stack more easily and enhance each component’s effectiveness.More