<i>The Matrix</i> ushered in a new generation of sci-fi movies and futuristic plotlines with a relentless, seemingly invulnerable set of villains. Twenty years later, that theme is all too familiar to security pros.

Stephen Cox, VP & CSA, SecureAuth

April 5, 2019

5 Min Read

It's difficult to believe that The Matrix celebrated its 20th anniversary in March. It's equally hard to ignore how well the film has stood the test of time. With Oscar-winning innovations in stunt work and special effects such as "bullet time," the sci-fi epic starring Keanu Reeves and Laurence Fishburne changed Hollywood, according to some film critics.

At least, I think so.

It's not just the special effects and plot development that remain fresh. What's relevant for security professionals is the similarities between the characters and plot and how we look at modern security practices and technology.

The film's protagonist — the computer programmer Mr. Anderson, played by Reeves — is one of billions of humans unwittingly inhabiting a simulated reality, referred to as the "Matrix." Through a process of self-realization and literal rebirth, he becomes the hero, Neo. The process has been triggered by his choice of swallowing a "red pill" of reality instead of the "blue pill" that will keep him ignorantly complacent in a contrived, alternative, and manipulative world.

Neo is analogous to present-day CISOs: security professionals who have taken the "red pill" and are awake to the reality of protecting a real-life business amid the frightening, shape-shifting threats from cybercriminals seeking to do harm. In The Matrix, this ever-present evil is determined to destroy Zion, the last human-inhabited city in the world.

How Neo Battled the 'Advanced Persistent Threat'
Shape-shifting is core to the movie's plot. "Agents," Neo's sinister enemies, take over the bodies of innocent bystanders in their relentless pursuit of Neo and his crew. The cybersecurity analogy here is an advanced persistent threat (APT) group utilizing stolen credentials to gain a foothold into an organization — one of the most pernicious elements facing today's enterprise.

Modern breaches often involve malicious APT-like agents gaining access to an employee's credentials in order to achieve their goal. This usually happens as a result of spearphishing attempts, enabling attackers to steal customer data, intellectual property, or financial and banking data.

Just as Neo stays vigilant in looking for constant threats, CISOs fight the epidemic of stolen credentials with proactive risk-based authentication techniques that stop attackers from even obtaining a foothold in the first place. The key in both situations is having visibility into attacker behavior.

The Battle Against Insider Threats, Matrix-style
As Neo begins his journey to the "real world," a jaded crew member, Cypher (Joe Pantoliano), asks, "Why, oh why, didn't I take the blue pill?" This was Cypher's rhetorical regret for not choosing to accept an easy, stress-free life in the Matrix rather than remaining in his real-world existence. Cypher's words actually foreshadow his true intentions when it's revealed he has sold out the crew on their ship, the Nebuchadnezzar, to the Agents in order to be "reborn" as a rich celebrity in the Matrix — without any memory of his past life.

Cypher represents an insider threat, trading the whereabouts of his crew for his own gain. In cybersecurity terms, insider threats are often embodied by employees, temporary workers, or contractors who have access to an organization's systems. Insider threats may either act alone or consort with the enemy. Tank — a computer operator comparable to a real-world security analyst — eventually kills Cypher. The security analyst defeats the insider threat.

For cybersecurity professionals, insider threats continue to plague organizations of all sizes. Consider these statistics:

Fortunately, malicious insiders who seek to steal data can be neutralized through a robust security program that includes network, endpoint and identity security, and pervasive vulnerability management, and focuses equally on protection, detection, and response.

Battling Cyber Villains Is Our Reality
There are several other parallels between the plot of The Matrix and the cybersecurity world:

  • Zion can be compared with an organization that needs protection.

  • The Nebuchadnezzar's control center is analogous to the security operations center (SOC).

  • Morpheus (Fishburne) is the security-aware CEO who recruits talented information security professionals to his team, ultimately enlisting Neo by offering the red pill (video) to wake him up to "the truth."

  • Trinity (Carrie-Anne Moss) is the "white hat" hacker friend of Neo who actually uses the Nmap scanning tool to help out her team in the second installment, The Matrix Reloaded.

  • The ability of The Oracle (Gloria Foster) to understand the human psyche to create a better Matrix could be compared with user and entity behavior analytics, and her ability to see into the future could be compared with the predictive analytics branch of statistical analysis — a fledgling area in cybersecurity.

The Matrix ushered in a new generation of sci-fi movies and brought back complex, futuristic plotlines that featured a relentless, seemingly invulnerable set of villains. Twenty years later, that theme can feel all too real for security professionals.

The facts remain: Bad actors come in all shapes and sizes, deploying new, sophisticated techniques to penetrate enterprises for any number of malicious reasons. As security professionals, we've taken the "red pill," which means we know how pervasive these threats are — and we've chosen to defend Zion against them.

Related Content:

 

 

 Join Dark Reading LIVE for two cybersecurity summits at Interop 2019. Learn from the industry's most knowledgeable IT security experts. Check out the Interop agenda here.

About the Author(s)

Stephen Cox

VP & CSA, SecureAuth

Stephen Cox is a technology veteran with nearly 20 years in the IT industry, including 10 years of experience leading software development teams in the security industry. A key player in some of the most influential IT security firms in the world, he is recognized as an expert in identity, network and endpoint threat detection, as well as an accomplished software architect. As vice president and chief security architect at SecureAuth, Stephen is helping to establish identity as the third pillar of security and the mission to eliminate identity-related breaches. Previously, Stephen served as technical lead of the endpoint and FireEye-as-a-Service development teams at FireEye/Mandiant. These teams specialized in forensics and endpoint event monitoring as part of the FireEye HX platform. Before Mandiant, Stephen was at RSA NetWitness, working as principal developer of NetWitness Spectrum. He served a number of years at VeriSign in support of the DNS Resolution Operations team, and also in various software development roles at Northrop Grumman and America Online.
 
Stephen holds a Master of Science in Software Engineering and a Bachelor of Science in Integrative Studies, both from George Mason University.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights