Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

6/13/2018
02:00 PM
Donald Meyer
Donald Meyer
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

LeBron vs. Steph: The NBA Version of Cyber Defense vs. Cyberattacks

It takes an aggressive, swarming approach to overcome the most dangerous threats today.

If LeBron James didn't play basketball, he'd be just as menacing as a hacker.

And if Stephen Curry hadn't been shooting 3-pointers before he turned 3 years old, he'd be just as effective at cybersecurity as he is a point guard.

For the fourth consecutive year, the Golden State Warriors played LeBron James' Cleveland Cavaliers for the NBA championship, with the Warriors dominating the series in a four-game sweep. If you've tuned in, you've seen an athletic blueprint for the new generation of cyberattacks.

In 2018, championship basketball has distinct parallels with "championship" cybersecurity. They're both about drawing from threat intelligence, deploying unified threat prevention, and securing the perimeter and infrastructure.

NBA teams that are still running isolated, disparate schemes are much like the 97% of organizations that haven't adapted to modern cyberattacks: They're wannabes and also-rans, all but begging to be defeated.

Nowadays, malware is bigger, faster, and smarter than before. Cybercriminals are attacking organizations' systems every day, yet only 3% of companies are actually defeating these threats. Taking on a singular force like fifth-generation malware requires nothing short of the most cohesive, innovative, and intelligent team to ever play the game.

LeBron James: As Tenacious as Fifth-Gen Malware 
Scientists in a lab wouldn't have the budget to engineer a better basketball player than the 6-foot-8, 270-pound LeBron James. At age 33, at the end of his 15th season, he's a singular force who has brought his teams to the NBA Finals for eight straight years, leading all players in every statistical category. 

Versatile, powerful, and prolific, James stands as the athletic equivalent of today's fifth-gen cyberattackers. Like King James, hackers attack multiple vectors. He takes his game inside, outside — all over the court. They'll infect your cloud, and if that doesn't work, they'll switch to relentlessly attacking your mobile, your endpoint, and your network until the malware breaks through.

By using hacking tools stolen from government agencies, fifth-generation attacks bring LeBron-like firepower. The WannaCry and NotPetya attacks, for example, were powered by exploits stolen from the NSA in the infamous Vault 7 hacking leak. Cybercriminals nowadays have access to the same tools that the CIA uses for its digital espionage, and their resulting malware is overwhelmingly powerful.

Cyberattacks have also taken center stage in warfare and crime, shutting down entire countries and spreading through continents at once, causing billions of dollars in damage. With more power and more avenues than ever before, cybercriminals continue to adjust their sights upward.

In that respect, they're no different than LeBron James and Steph Curry — with Curry the unstoppable force to James' immovable object.

Steph Curry's Warriors: A Team Approach That Secures Wins
Curry is the undisputed leader of this Golden State Warriors dynasty. Although the team is loaded with other superstars —including Kevin Durant, Klay Thompson, and Draymond Green — most of the time, all eyes are on Curry. That's because he's good enough at dribbling and shooting that he can take an outside shot from anywhere on the court.

But pay close attention to what the other four Warriors are doing.

On offense, they're providing the chaos needed by screening out defenders and through rapid-fire passing to open-enough space for any of them to cleanly shoot the ball. James may be able to shut down any individual player on defense, but he can't be in two or three places at once. It becomes nearly impossible for the Cavs to keep up with everybody.

On defense, all five Warriors are constantly switching and rotating. On practically every Cleveland possession, whoever has the ball is seeing multiple Warriors defenders. When the defenders step out, they're closing any gaps on the sides for the offensive players to pass through.

At their best, they are unified and cohesive, constantly communicating with each other in order to be aware of each other's movements. 

A Unified Approach to Defense
What can cyber professionals learn from Curry's approach? Cyber defense requires that unified, cohesive system, too.

Fifth-gen malware is able to infiltrate a system by moving laterally, but when an organization has connected, integrated solutions in place for its cloud and mobile networks, it can maintain consistent defense by switching up against the malware. If the malware tries to enter in the cloud, a unified, comprehensive approach will alert and defend the rest of the system about this particular threat.

Instead of having five separate defenders for your organizations all operating independently, you need one defensive system where different products are working together, closing any gaps before they emerge.

Much like the Warriors, the right cyber defense will constantly switch, screen, and communicate in a cohesive fashion. That will enable them to rain devastating 3-pointers, Steph Curry-like, against the LeBron James-esque fifth-gen malware of the world.

Related Content:

 

Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more information.

Donald Meyer is the head of product cloud and data center at Check Point. He has more than 17 years of networking and security industry experience. In his current role, he is responsible for Check Point data center and cloud security. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Can you smell me now?
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11844
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
CVE-2020-6937
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
CVE-2020-7648
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
CVE-2020-7650
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
CVE-2020-7654
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.