Vulnerabilities / Threats

6/13/2018
02:00 PM
Donald Meyer
Donald Meyer
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

LeBron vs. Steph: The NBA Version of Cyber Defense vs. Cyberattacks

It takes an aggressive, swarming approach to overcome the most dangerous threats today.

If LeBron James didn't play basketball, he'd be just as menacing as a hacker.

And if Stephen Curry hadn't been shooting 3-pointers before he turned 3 years old, he'd be just as effective at cybersecurity as he is a point guard.

For the fourth consecutive year, the Golden State Warriors played LeBron James' Cleveland Cavaliers for the NBA championship, with the Warriors dominating the series in a four-game sweep. If you've tuned in, you've seen an athletic blueprint for the new generation of cyberattacks.

In 2018, championship basketball has distinct parallels with "championship" cybersecurity. They're both about drawing from threat intelligence, deploying unified threat prevention, and securing the perimeter and infrastructure.

NBA teams that are still running isolated, disparate schemes are much like the 97% of organizations that haven't adapted to modern cyberattacks: They're wannabes and also-rans, all but begging to be defeated.

Nowadays, malware is bigger, faster, and smarter than before. Cybercriminals are attacking organizations' systems every day, yet only 3% of companies are actually defeating these threats. Taking on a singular force like fifth-generation malware requires nothing short of the most cohesive, innovative, and intelligent team to ever play the game.

LeBron James: As Tenacious as Fifth-Gen Malware 
Scientists in a lab wouldn't have the budget to engineer a better basketball player than the 6-foot-8, 270-pound LeBron James. At age 33, at the end of his 15th season, he's a singular force who has brought his teams to the NBA Finals for eight straight years, leading all players in every statistical category. 

Versatile, powerful, and prolific, James stands as the athletic equivalent of today's fifth-gen cyberattackers. Like King James, hackers attack multiple vectors. He takes his game inside, outside — all over the court. They'll infect your cloud, and if that doesn't work, they'll switch to relentlessly attacking your mobile, your endpoint, and your network until the malware breaks through.

By using hacking tools stolen from government agencies, fifth-generation attacks bring LeBron-like firepower. The WannaCry and NotPetya attacks, for example, were powered by exploits stolen from the NSA in the infamous Vault 7 hacking leak. Cybercriminals nowadays have access to the same tools that the CIA uses for its digital espionage, and their resulting malware is overwhelmingly powerful.

Cyberattacks have also taken center stage in warfare and crime, shutting down entire countries and spreading through continents at once, causing billions of dollars in damage. With more power and more avenues than ever before, cybercriminals continue to adjust their sights upward.

In that respect, they're no different than LeBron James and Steph Curry — with Curry the unstoppable force to James' immovable object.

Steph Curry's Warriors: A Team Approach That Secures Wins
Curry is the undisputed leader of this Golden State Warriors dynasty. Although the team is loaded with other superstars —including Kevin Durant, Klay Thompson, and Draymond Green — most of the time, all eyes are on Curry. That's because he's good enough at dribbling and shooting that he can take an outside shot from anywhere on the court.

But pay close attention to what the other four Warriors are doing.

On offense, they're providing the chaos needed by screening out defenders and through rapid-fire passing to open-enough space for any of them to cleanly shoot the ball. James may be able to shut down any individual player on defense, but he can't be in two or three places at once. It becomes nearly impossible for the Cavs to keep up with everybody.

On defense, all five Warriors are constantly switching and rotating. On practically every Cleveland possession, whoever has the ball is seeing multiple Warriors defenders. When the defenders step out, they're closing any gaps on the sides for the offensive players to pass through.

At their best, they are unified and cohesive, constantly communicating with each other in order to be aware of each other's movements. 

A Unified Approach to Defense
What can cyber professionals learn from Curry's approach? Cyber defense requires that unified, cohesive system, too.

Fifth-gen malware is able to infiltrate a system by moving laterally, but when an organization has connected, integrated solutions in place for its cloud and mobile networks, it can maintain consistent defense by switching up against the malware. If the malware tries to enter in the cloud, a unified, comprehensive approach will alert and defend the rest of the system about this particular threat.

Instead of having five separate defenders for your organizations all operating independently, you need one defensive system where different products are working together, closing any gaps before they emerge.

Much like the Warriors, the right cyber defense will constantly switch, screen, and communicate in a cohesive fashion. That will enable them to rain devastating 3-pointers, Steph Curry-like, against the LeBron James-esque fifth-gen malware of the world.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information.

Donald Meyer is the head of product cloud and data center at Check Point. He has more than 17 years of networking and security industry experience. In his current role, he is responsible for Check Point data center and cloud security. View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
New Mirai Version Targets Business IoT Devices
Dark Reading Staff 3/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Reading Schneier's Friday Squid Blog again?
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.