Careers & People

11/28/2016
02:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Q&A: SonicWall CEO Talks Rise Of Ransomware, IoT

Bill Conner discusses security risks at top of mind as the newly appointed leader of SonicWall, a company becoming independent for the second time.

Bill Conner is a networking and security professional with more than 30 years of experience in the industry. His leadership roles include nearly 13 years as president and CEO of Entrust, which was followed by terms as CEO of Silent Circle, Inuvo, and FWC Consulting. He was appointed to lead SonicWall in November 2016, when the company was spun out by Dell.

Dark Reading Associate Editor Kelly Sheridan recently spoke with Conner to discuss the security risks he has at top of mind as he leads SonicWall into its second term as an independent company.

(Image: Bill Conner, President and CEO of SonicWall)

(Image: Bill Conner, President and CEO of SonicWall)

Dark Reading: What are some of the most important security trends you're watching as we move into 2017?

Conner: There are six areas I'm zeroing in on: ransomware, cloud and management, hardware and operating systems for deep packet inspection and performance, global grid network threat capabilities, IoT, and email security.

Dark Reading: Which of these risks do you view as most important to businesses, and why? Which will pose the greatest risk if not addressed?

Conner: Bad actors are actively using ransomware to hold businesses, institutions, and individuals hostage. The rise of ransomware can be attributed to how quickly attackers can capitalize on thousands of victims in a short period of time as opposed to a targeted attack, which requires more work and time to monetize from a single breach.

In a survey of SonicWall channel partners, we discovered ransomware is the single topic they currently need more information on to serve their customers. It's the number-one issue their customers are asking about right now.

Dark Reading: How has ransomware evolved as an enterprise security risk?

Conner: Ransomware is still alive, but the trends are changing. Consider the start of the holiday shopping season. In stores, credit card chips have helped reduce the point-of-sale (PoS) risk factor; however, more people are now shopping online.

This is causing issues on the consumer side. Are shoppers accessing legitimate sites? Is their software updated? Criminal activity that once targeted the PoS is going right to consumers, but it could also expand to hit BYOD and work networks. Not all online shopping is done at home.

Businesses must figure out how to address this risk. Should they manage some of their bandwidth so workers aren't streaming video? Should they limit bandwidth to lunch hours or before/after work? Should they enable content filtering to monitor and manage websites?

Dark Reading: You're leading SonicWall as it becomes an independent company for the second time. What are your security priorities during this transition?

Conner: My priorities align with the trends we discussed before: ransomware, cloud and management, hardware and operating system, global grid network threat capabilities, IoT, and email security.

Pulling back, the big picture is about returning SonicWall to the speed and innovation this space needs. We were an ingredient brand in a large company, and Dell's roadmap of innovation is different from what it is when you're defending against the bad guys every minute of every day. Ours requires a different pace. 

Dark Reading: Where do you see the future of SonicWall going in 2017 following the Dell spinoff?

Conner: Prior to the spinoff, SonicWall had not been moving as fast with its channels and products relative to the market. In 2017, we expect to be at a market growth rate of 10% on average, and we plan to grow more than our fair share in the market next year. 

Key focus areas include customer and channel support. We see an unmet need in the market, and I think we can differentiate our level and brand of service to channels and end users. This will include providing more transparent service and making it easier for customers to contact us through social media, video, phone, etc. 

Dark Reading: How has the Internet of Things evolved as a security risk?

Conner: The IoT is only starting to make its way to the corporate security space. There are more devices out there connecting to consumer laptops and being deployed in business networks. ISIT departments are seeing this and saying "Hey, what kind of vectors is this opening up?"

Businesses don't want their networks compromised. We're in the early infancy of actually being able to filter these networks because a lot of them have been open. Security has been considered, but most of it is pretty rudimentary. 

Dark Reading: What are some of the specific security threats you see in using IoT devices? Are businesses addressing these threats now?

Conner: Businesses are using more IoT devices than ever before, and these connections mean more doorways to protect. 

Consider, for example, convenience store chains. They may have dozens of WiFi or Ethernet-connected devices in each store, including cash registers, cameras, soda machines, and refrigerators.

With recent malware variants like Mirai, these IoT devices are being targeted and used in concerted DDoS attacks. Obviously, businesses don't want their IoT devices being hacked, so it's important to have a next-gen firewall with sandbox technology to detect and prevent zero-day threats, as well as SSL inspection to decrypt and inspect SSL connections. 

Dark Reading: What are some of the best practices businesses can implement to protect against these risks as the IoT continues to grow?

Conner: For one, make sure employees' applications and operating systems are current. Ensure all new patches are in place and latest software is being operated. This isn't only relevant to the ISIT world, but on the endpoints where employees are.

With BYOD policies, the apps people use during the day are not controlled by ISIT. Whether or not your company allows this, keeping software current is critical. Employees should know to access legitimate websites to update their apps.

Some small organizations have a common laptop to provide a convenience. Public devices on these networks tend to get infected at alarming rates; keeping them clean is virtually impossible. Have employees use Apple platforms or Android devices protected with the right technology.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
Surviving the IT Security Skills Shortage
Surviving the IT Security Skills Shortage
Cybersecurity professionals are in high demand -- and short supply. Find out what Dark Reading discovered during their 2017 Security Staffing Survey and get some strategies for getting through the drought. Download the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.