Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News & Commentary

12/15/2020
10:00 AM
Steve Ryan
Steve Ryan
Commentary
50%
50%

The Private Sector Needs a Cybersecurity Transformation

Cybersecurity must get to the point where it's equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.

Today's cyber-defense protocols often look something like an unarmed security guard at a parking garage. Someone reports their car stolen or vandalized, and all the guard can do is report that it's happened. Hopefully, the guard is backed by a security system with cameras, and if there's a good description of the perpetrator, the guard can keep a lookout. But there isn't much more the guard can do. He can't call for support every time someone suspicious looking walks in, nor can he actively engage with each and every car alarm.

Related Content:

Startups Should Do Things That Don't Scale, but Security Isn't One of Them

Building an Effective Cybersecurity Incident Response Team

New From The Edge: 'Tis the Season to Confront Third-Party Risk

This is the reality for so many IT and security teams that are exhausted from responding to threats that have already happened and chasing down the pile of false positives clogging their queue. Most cybersecurity vendors boast about protection, but what they really mean is their appliance or software can detect something and feed a security information and event management system. All that does is put more pressure on IT to set the stage and defend against what's next, so long as it looks exactly like what came before. In today's increasingly digital world, that's just not good enough.

Indeed, this type of operation has, unfortunately, made massive and damaging vulnerabilities the norm. Companies have lost millions as a result, with the average breach costing nearly $4 million in 2019. Those costs also pile up over time as the trust of once-loyal consumers evaporates when troves of personal data are compromised. Yet many businesses simply aren't aware that the prevailing posture of "detect, respond, recover" is outdated and inefficient.

By next year, more than 12 billion smart devices will keep us connected to friends, family, and work — 3 billion more than a year ago. If businesses want to realize the enormous potential that digital transformation offers, another transformation is also in order: one that will bring about a new standard of defense to match the connectivity and sophistication of cyberattacks that are increasing by the day.

But first, we have to redefine longstanding principles about what cybersecurity is.

Focusing on the Past to Protect the Future
Fundamentally, the current approach to security is focused on the past — even if it's just a few milliseconds ago. Identifying a threat that already occurred and stopping the next one is not protection. And with the advances in technology available today, it should not be the accepted protocol for our industry.

When a time-consuming analysis results in the conclusion of "we can block this attack next time," you are nowhere close to secure. Simply put, this approach does nothing to account for the agile adversaries that we know exist.

Staying agile in this fight means looking forward, not back. For that to be a reality however, time plays a crucial role. Research from Ponemon Institute shows that security teams spend at least 25% of their time chasing false positives. I'd argue it's even higher. Defense cannot continue to be about uncovering the threats that have already happened while trying to block them again. Time has to be spent on truly preventing what's coming next.

Committing Time to the Wrong Pursuits
Another hallmark of mainstream defense is that the presence of so many false positives consumes the most precious commodity IT teams have: time. In one recent study, more than half of cybersecurity professionals surveyed had left a job — or know someone who had — due to burnout and overwork. The reason so much time is invested in low-yield activities points to the fact that the industry still largely views prevention through a hygiene lens.

While hygiene is important, there is very little prevention going on at the threat level. Well-meaning employees have been stretched so thin that they find post-event response acceptable and equate it to cybersecurity. Sometimes hygiene equates to patching, but often there is a good reason why you can't patch. That's not their fault; it's simply the limitations of the system they're working with.

As an industry, we must get to the point where cybersecurity is equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away. Are they hiding in a ZIP file? A nesting of ZIP files? Does the ZIP file contain an RTF? With OLEs and CFBs? Or was it obfuscated JavaScript in the Web session? Can you look inside there and find the shellcode that doesn't belong? Can you do that in flight — while the Internet session is building? Without slowing the session down? And if you can detect that hidden or heavily obfuscated code, what happens next? Do you just block? Generate an alert? How sure are you?

It is possible to stop attacks with extreme precision before they become a problem — whether it's through a man-in-the-middle that neutralizes an attack or another tool that enables active defense. This is about more than taking the techniques of your adversaries off the board. This approach will be essential for the future of our industry, so overworked IT teams can stop responding to attacks that have already happened and start experiencing protection at a whole new scale.

Steve Ryan is founder and CEO of Trinity Cyber, a company redefining network threat prevention. Steve left the National Security Agency in 2016 as the Deputy Director of its Threat Operations Center after a distinguished 32-year career as a custom chip designer and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NU-Cengel
100%
0%
NU-Cengel,
User Rank: Apprentice
12/15/2020 | 10:59:39 AM
It's really about the fundamentals
Really nice article and accurate as well. There definitely is too much emphasis on detect and not enough on prevent. From my perspective, what really gets most organizations is not some super sophisticated attack. It's really about neglecticing the basics, the fundeamentals... stuff that most of us already knew 30 years ago.

Too many organizations think that they can mostly ignore security in how they go about operating and organizing what they do on a daily basis and then throw a bunch of cash at some fancy tools to layer on top under the false impression that will save them...it won't. Sure they may have a CISO and a cyber-security staff but those positions aren't looked at as fundemental to shaping how the business operates, they are add ons that live in thier own world and do their own thing and mostly get called upon to report when something has already gone wriong, much like the security guard in your story.

Ultimately, decent security isn't really that complex... what's going to stop 95 percent of the breaches that occur doesn't require rocket science or a boat load of cash, nor even that much in the way of tools beyond the basics.... what it does require is discipline and consistancy and an understanding from the ground up that security WILL effect the way the organization operates, how non-security staff have to behave and yes, sometimes it will be a slight inconvenience.

Cyber-security is much like sports, if you ignore the fundementals you aren't going to win ball games, no matter how much money you throw at equipment. Cyber-Security today for too many organizations is alot like spending $1000 on a bat and $1500 on a glove .... and never holding practice.

 
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-40526
PUBLISHED: 2021-10-25
Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead t...
CVE-2021-40527
PUBLISHED: 2021-10-25
Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile applic...
CVE-2021-40371
PUBLISHED: 2021-10-25
Gridpro Request Management for Windows Azure Pack before 2.0.7912 allows Directory Traversal for remote code execution, as demonstrated by ..\\ in a scriptName JSON value to ServiceManagerTenant/GetVisibilityMap.
CVE-2021-21703
PUBLISHED: 2021-10-25
In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the ma...
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...