sb-nz logo
Story image

Learning from the past to protect the future of IoT and cloud

12 Mar 2018

This year it is likely that cyber adversaries will use a known vulnerability to conduct their attacks, despite belief to the contrary that suggests attackers are developing more sophisticated threats. That’s what the team from ForeScout believes at least, and those vulnerabilities are quite accessible.

“Given how accessible known vulnerabilities are to organisations as well as hackers, it is critical to have good cyber hygiene. This is the foundation of an enterprise to prevent hackers from taking advantage of a weak link and exploiting a vulnerability before it can be patched or updated,” comments ForeScout’s chief marketing officer Steve Redman.

It’s a double-edged sword for some macro trends that are currently having a positive – and negative impact for organisations and their security challenges. They include:

Growth and diversity of devices and platforms. By 2020, there will be 30 billion devices.  There will be more new devices introduced in the next few years as there were in the first 20 years of the Internet age.

These devices serve a variety of consumer and business purposes, and, with diversity of vendors, comes a diversity of operating system platforms. This means that organisations need to have visibility and control over these devices.

Yet the challenge is in how to find tools to manage them. For tools that require agents, those vendors already have a have a difficult time keeping with the operating systems let alone the hundreds of operating systems now coming out for Internet of Things (IoT) devices including operational technology (OT). 

IT is converging with OT to drive innovation and productivity. IT is merging with OT for monitoring and improved business performance. This innovation is happening in supervisory control and data acquisition (SCADA) devices and industrial control systems (ICS) typically found in dams, bridges, oil and gas pipelines, manufacturing assembly lines, and other critical infrastructure.

Given the importance of these devices, they can seldom be taken down for maintenance or patching, and agents are often impossible to install. These networks, once separate, have now merged, leaving themselves open to new cyberthreats. As the industrial IoT revolution is taking place, organisations are realising that they don’t understand what they have connected and the risks they face. 

“Hackers now have the tools to compromise not only sensitive networks, but also critical infrastructure. It’s no longer just about data being stolen, it’s about line of business and knowing what OT an organisation has before a breach can negatively affect its bottom line and impact the company where it really hurts: critical business operations; safety; and revenue,” Redman says.

The rapid adoption of cloud to accelerate business growth. Organisations are expanding their networks into the cloud, running more virtual machines on Amazon and Microsoft, using public cloud resources and software-defined networks to make networks more agile. Organisation will have a hybrid mix of virtual and physical servers, storage, and networking technologies that need managing and securing.   

“Unless organisations adopt stronger best practices and mitigate risk appropriately, in 2018, we will likely continue to see the same types of threats prey on networks. However, the stakes are much higher today as there is more at risk,” Redman concludes.

Story image
Kroll completes Redscan acquisition, expands cyber risk portfolio
With the addition of Redscan and its extended detection and response (XDR) enabled security operations centre (SOC) platform, Kroll expands its Kroll Responder capabilities to support a wider array of cloud and on-premise telemetry sources.More
Story image
Cohesity appoints its very first CISO
In the newly created role, new appointee Brian Spanswick will focus on advancing and optimising IT and security for Cohesity and its customers, the company says.More
Story image
Video: 10 Minute IT Jams - Radware VP on the challenges of cloud security
In this interview, Techday speaks to Radware vice president of technologies Yaniv Hoffman, who discusses the primary challenges facing IT organisations in terms of their cloud security apparatus.More
Story image
Cybercriminals influencing financial markets, report finds
The financial sector is being targeted by cybercrime cartels and nation-states, and the bank heist has evolved significantly — from a heist to a hostage situation.More
Story image
97% of organisations experienced a mobile threat in 2020 — report
93% of these attacks originated in a device network, which includes attempts to trick users into installing a malicious payload via infected websites or URLs, or to steal users’ credentials.More
Story image
Dell Technologies unveils new data protection innovations for hybrid cloud workloads
The Dell EMC PowerProtect Backup Service, powered by Druva, is designed to deliver SaaS app protection without increasing IT complexity.More