Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

03:50 PM
Simon Marshall
Simon Marshall
Simon Marshall

Government Insiders Are Security's Biggest Risk

Outside actors can be dangerous, but the biggest risk to organizations comes from within.

In the government security sector, you shouldn't need Forest Whitaker to tell you that the enemy is within. That's according to a survey that finds nearly three out of four worldwide government entities had their security breached last year. Every single entity that replied to the survey said they felt employees were the biggest threat to security, mostly through either human error or insider IT misuse.

Relax about old Cold War enemies, don't worry about potential Chinese sources of WannaCry and close your ears to threats from hackers threatening to leak the Game Of Thrones season finale. More, be anxious about how employee exposure to government data is occurring while government entities continue to prioritize security outside-the-perimeter over in-.

Survey author Netwrix, a firm that provides behavior-based analytics to predict risks from employee-based IT changes, claims there's a huge mis-determination that outside-in security risks are more worrisome than inside-out.

"Most security professionals think they know what to expect (from internal threats), but they don't really have the knowledge to handle them," Michael Fimin, CEO of Netwrix, told Security Now. "You can lock the door to your house but remain open to intrusions; you can sleep upstairs and not know what's going on downstairs."

There shouldn't be an "us" and "them," but government entities are struggling to understand how they can guard against insider actions -- consciously made or through mishap -- especially when BYOD presides. 75% of respondent entities reported they had no visibility into BYOD activity, nearly 70% were unaware of shadow IT, and about 60% knew nothing about the cloud infrastructure they were using. As a whole, the survey results can be viewed as highlighting a candid snapshot between the value of government data and the very insecure ways it is currently accessed, managed and maintained.

"We're moving from a time-honored, rules-based model to something else, because there's just too much data," said Fimin, "Now, it's all about machine learning, and that's something we have in our roadmap." With so many data sources, varying data quality and classification, and different user behaviors, gaining a predictive posture and consequent extra threat-reaction time through machine learning is the way.

This is a highly specific area within the data security family, but Fimin highlights Veronis and Titus as somewhat competitors because they overlap or part-complement Netwrix' solution areas. Veronis and Titus play within Data Classification – another area where data effectiveness and integrity is foremost. In fact, what they do can be seen as an integral part of the 'Effective Internal Data' mission; Netwrix focuses on users' (mis)behavior, and the other two examine better ways to classify/group data, so the resultant data analysis/time-to-react is optimized because there's extra context/insight included.

Clearly this sector is attracting funding. But Netwrix itself has not needed to go through the constant window dressing required for multiple funding rounds. Founded in 2007, it took what it classifies as a Series A round, but foresees no more.

Get real-world answers to virtualization challenges from industry leaders. Join us for the NFV & Carrier SDN event in Denver. Register now for this exclusive opportunity to learn from and network with industry experts -- communications service providers get in free!

"Round A was not necessarily driven by a need to raise money," said Fimin. "We don't anticipate further funding rounds because (Series A) was driven by a desire for greater board experience. Our board members have run larger companies before, which is an obvious advantage for us, and we are also able (from Series A) to grow-out our technology and the scalability of our sales operations. We have no need to participate in further rounds."

So, what's the market currently worth? IDC told SecurityNow that for the 2017 calendar year, it expects federal agencies to spend a total of US$3.7 billion, growing to $4.7 billion by the end of 2020. In percentage terms, the CAGR for cybersecurity for 2015 through 2020 is expected to be just over 8%. During 2017, IT security spending breaks out to roughly $1.8 billion for the Defense Department (DoD) and $1.9 billion for civilian agencies. By 2020, says IDC, that will grow to $2.5 billion for DoD and $2.2 billion for the agencies.

So, budget will grow -- but so will threats as a whole. IDC said that these mostly include ongoing threats to government systems, but also to consider are foreign attempts to tamper with political parties, elections, and federal agencies, threats to the nation's physical infrastructure (dams, bridges, water systems, and more), and monitoring network traffic to look for attempts to exploit weaknesses and to compromise data and systems government-wide.

Related posts:

Simon Marshall has worked within and around the telecom and IT industries for 21 years. Simon cut his teeth as editor-at-large at totaltelecom.com in the late Nineties, drove strategic communication and product marketing plans for Qualcomm, Neustar and Redknee during the Noughties, and lives today as a technical consultant, active tech news junky and content underwriter at Security Now.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.