CBI
CBI

Finding Threats on Your Network: Hunt or Be Hunted

Posted by Tony Bradley on Jun 8, 2016 3:31:56 PM

Target.jpg

Guest Author: Tony Bradley
Originally Published: 5/5/2016

Is your network secure right now? Have any of your PCs or mobile devices been compromised? Before you even attempt to answer these questions, you need to pause and ask yourself: Can you actually answer either of these questions with any degree of certainty? Think hard about that one—because your job may depend on it. According to the recent Verizon Data Breach Investigations Report (DBIR), the average time it takes for an organization to detect a compromise or to discover an attacker inside its network is measured in months—and sometimes years—rather than hours or minutes. With many of the major data breaches in recent years, the company found out about the attack the hard way—with a phone call from a credit card merchant or the FBI reporting stolen customer data being exposed or used in the wild.

The traditional security model is no longer working
Watch On-Demand Webinar The problem is a function of the traditional approach to security. The standard model employed by most organizations for the last decade or more is broken, and it’s time for a new strategy that focuses less on prevention. You need to look at security through a lens of shortening that time to detect a compromise and actively hunting for threats.

It isn’t really a secret that the perimeter is dead. The concept of “inside the network” and “outside the network” and the idea that you can protect your network and data by simply keeping the bad guys out has been an outdated strategy for some time now. The explosion of mobile devices and BYOD (Bring Your Own Device) programs and the rise of cloud services have effectively removed whatever wall might have previously existed between your network and the bad guys.

The threat landscape has changed
Even if that was not the case, the reality is that the threat landscape shifted as well. While organizations were busy trying to harden the network perimeter, cyber espionage malware attacks like Stuxnet, Flame, and Duqu were silently spreading … undetected. While IT admins have been busy looking for unauthorized access and trying to keep the bad guys out, the attackers have been stealing credentials and logging in with valid usernames and passwords.

The vast majority of network compromises and data breaches have the appearance of authorized activity

The reality is that the vast majority of network compromises and data breaches have the appearance of authorized activity. Whether it’s an inside job by a disgruntled employee, or an external attacker using a username and password captured in a phishing attack, what you see on your network is an authorized user with valid credentials. The crucial key isn’t whether the authentication itself is valid, it’s whether the access is common behavior, and whether the actions taken once the access is granted seem normal or suspicious.

Transform security
How can you defend your network and data against current threats? Effective security comes down to three things: visibility, context, and action. You have to pay closer attention. You need tools in place that can actively monitor all of the endpoints and devices on your network—that can combine business intelligence and threat intelligence to provide context and help you identify suspicious or malicious activity. 

Original Article Link: http://www.tenable.com/blog/finding-threats-on-your-network-hunt-or-be-hunted-0 

 

Topics: Compliance, data breaches, IT Security, Network Security, Tenable, Vulnerabilty

Tony Bradley

Written by Tony Bradley

Tony Bradley is Tenable’s Community Manager, responsible for facilitating and leading online forums, chat groups, and meetup groups for Tenable customers. Tony shares online technical presentations, discussion posts, best-practice demonstrations, how-to product blogs, videos, and newsletters to help infosec professionals use Tenable products more effectively. Best known as the Editor-In-Chief and Founder of TechSpective, Tony has written about technology for over a decade. As a freelance writer, he has created white papers, contributed to sites such as Forbes, PCWorld, and CSO, co-authored 10 books, and authored thousands of online articles. Tony’s technical credentials include serving as Chief Marketing Officer at Zecurion, Director of Security with Evangelyze Communications, and Senior Security Architect at EDS. Tony is a Microsoft MVP and a CISSP.

Would you like to Contact Us?

Subscribe to CBI Blog Notifications


Connect with an IT Risk Management Expert