Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

4/24/2018
05:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Coviello: Modern Security Threats are 'Less About the Techniques'

Today's attack surface is broader, more open, and demands a proactive approach to security, according to former RSA chairman Art Coviello.

As the threat landscape changes, so too do demands on cybersecurity leaders and their teams. Art Coviello, executive chairman (ret.) of RSA, says today's defenders should be more concerned about vulnerabilities in the attack surface than on threat actors' specific techniques.

"What people don't get about the threat landscape is, it's less about the techniques and more about the attack surface, and the number of openings that have been created," Coviello said in an interview with Dark Reading during last week's RSA Conference in San Francisco.

He explained how security concerns have shifted since the time of the dot-com crash, when there were maybe 20- to 30 computer viruses. "Now, there are hundreds of millions," he pointed out. The tipping point came in 2007, a "watershed year" in which mainstream applications went online and the iPhone launch kickstarted the "age of mobility."

From that point, the attack surfaced continued to expand and has ever since, he said. Now we're at a point when employees are going straight from their devices to the cloud. The priority is no longer solely attack prevention, said Coviello, who serves on the Board of Directors at EnerNOC, AtHoc, and Tenable. It's about a resilient, holistic approach, he said.

One of the places where organizations leave themselves vulnerable is Web applications. With the onset of agile development, Web apps are no longer a curiosity, he said. They're expected. The waterfall method, in which apps were delivered annually or every six months, has been replaced with agile methodology. Now, developers are creating and updating apps in real-time.

Today's dev teams are under increasing pressure to make applications safe from the start. "If you don't build secure code in the first place, you're in big trouble in an age of agile development," said Coviello. If they don't get it right, security teams face the consequences.

With a larger attack surface, companies also have to do a better job of incident detection, response, and recovery. As security operation centers (SOCs) have become overwhelmed with alerts from their growing collection of intelligence systems, prevention is again top of mind. If they have enough information, security teams can spot when attackers are taking action.

"The best place to stop an attack is before it starts," Coviello noted.

The influx of threat intelligence tools has driven a change in mindset from reactive to proactive security. Previously, "all of the tools were siloed," he explained. "They only did one specific things; they didn't add any value to each other." Reactive security meant "plugging in the holes" between tools that left information and assets exposed.

Today's intelligence-driven security model makes it easier to identify and prioritize critical assets, applications, and infrastructure. Security controls need to add value to one another; for example, data loss prevention tools can help pinpoint critical assets. "We can't defend everything," said Coviello. "We have to understand what's most important." This means determining where valuable data lies and how an attacker might try to get it from the outside.

Proactive security may be the way to go, but many businesses have struggled to adopt it. "There's a critical shortage of people to implement that model," said Coviello, pointing to a key trend heard throughout the RSA Conference. "The cost of acquiring talent is skyrocketing."

It's also tough to convince business leaders to adopt new technologies when they don't understand the threats and risk. Most senior management employees don't understand technology, he explained, and neither do executive boards.

Finally, there is a need for more advanced technology to defend the rapidly expanding attack surface. "The attack surface has been growing faster than the industry has been able to develop the tools," Coviello noted.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda here. Register with Promo Code DR200 and save $200.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
mehdi1973us
100%
0%
mehdi1973us,
User Rank: Apprentice
4/25/2018 | 6:51:51 AM
Nice article
I was cheerful and happy enthusiastic when this blog was presented. Interesting stuff to read. Lots of flowers and gifts for you.

 
FranchiseGlace
50%
50%
FranchiseGlace,
User Rank: Apprentice
4/25/2018 | 6:14:13 AM
Protect data
I think the most important thing in security, is to protect the data
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I can't find the back door.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21272
PUBLISHED: 2021-01-25
ORAS is open source software which enables a way to push OCI Artifacts to OCI Conformant registries. ORAS is both a CLI for initial testing and a Go Module. In ORAS from version 0.4.0 and before version 0.9.0, there is a "zip-slip" vulnerability. The directory support feature allows the ...
CVE-2021-23901
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
CVE-2020-17532
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.