Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    IT Managers Struggling to Keep Up With Cyber-Threats: Security Experts

    Written by

    Wayne Rash
    Published November 19, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      DALLAS—Sometimes unanimity is refreshing, but not when panel after panel at the Metro Ethernet Foundation’s GEN15 conference here delivers the same depressing news. Despite all the work that’s been done to improve enterprise and network security, the picture is far worse today than at any time in the past.

      Timothy Wallach, supervisory special agent from the Federal Bureau of Investigations Seattle field office cyber task force, said that the level of criminal activity attacking enterprises in the U.S. has reached an all-time high.

      Wallach also said that despite the worries about insider attacks, “those are only a small percentage of the attacks we see.” He said that the vast majority of attacks on businesses are criminal activity seeking to steal information from companies that can be used by competitors or that can be sold on the dark Web.

      While criminal actors are the single biggest source of threats, there are plenty of others, Wallach said, including political activists who want to disrupt businesses for some political gain or to make a point.

      He also listed nation-state actors who will attack an enterprise, frequently as a means of gaining access to some other company with which they do business. “No one is immune from these attacks,” he said.

      What makes the latest attacks so serious is that perpetrators are better funded and usually more skilled than they have been, but Wallach also noted that even relatively unskilled attackers have access to sophisticated tools to break into networks and to launch attacks. He said that it’s not unusual for IT managers to find that their networks have been infected for years.

      Stuart McClure, founder and CEO of Cylance, speaking on the same panel, said that once security managers start looking for threats that already exist on their networks, “It’s like turning on a black light in a hotel room, you have to be ready for what you’re going to find.”

      He said that it’s not uncommon to find that the hackers have penetrated far more of a company’s network than anyone realized and may have been stealing information for years. “You might wish you hadn’t looked,” he said.

      During an earlier panel discussion, Ethernet inventor Robert Metcalfe, said he’s been trying to encourage better security for networking, saying that in some instances the Internet of Things was going to be a significant weak point. He said that better authentication should be designed into embedded electronics. Metcalfe noted that such security problems were going to be growing in importance as the IoT becomes more widespread.

      IT Managers Struggling to Keep Up With Cyber-Threats: Security Experts

      McClure agreed, and told of one test he ran in which he was able to hack into an insulin pump. The pump, which is designed to regulate insulin delivery to diabetic patients automatically using an embedded wireless blood glucose sensor turned out to have a back door.

      He explained that the manufacturer designed the pump so that it would only talk to the sensor using a specific serial number, but to make testing easier at the factory, the serial number “999999” would also work. McClure said that he would have been able to force the insulin pump to deliver too much insulin, killing the patient.

      He said that when he revealed this to the manufacturer, they seemed to be unsure of what to do about the problem. But then the manufacturer said that the security hole was actually a feature because it made testing easier. Eventually the manufacturer understood why this was serious, and has since fixed those insulin pumps, but it illustrates the problem and the importance of getting IoT security right.

      Unfortunately, the problem of security at all levels persists. Wallach said that in some cases device manufacturers realize that security is important, but they have trouble gaining management approval for security measures because of cost considerations. McClure said that the only way to solve the cost problem is to design security into devices from the beginning. That way, he said, the cost of security wouldn’t be seen as an add-on.

      So what about those insider threats that seem to have become so visible lately? Even though the FBI doesn’t see those as often as they see criminal activity, they’re still important. Worse, they’re very difficult to defend against. “They know the system,” McClure said, “they know where the important information is kept and they know how to get to it.”

      Still, there is some hope. “The defenders are getting smarter,” McClure said, but he noted that the picture isn’t as bright as anyone would like. “The attack surface area is so large that we’re basically janitors trying to clean up at the end of the day.”

      The answer, Wallach said, is to focus on things that IT managers can change. That includes shifting focus to the endpoint because that’s where the attacks are aimed these days. He pointed out that while perimeter defenses aren’t the only answer, they are part of the solution. “There’s that old notion of defense in depth,” he said.

      That means that the only way that security will work is to deploy it in layers so that no single attack can get to everything.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×