Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Security Pros See Compromised Credentials as Top Concern

    Written by

    Sean Michael Kerner
    Published January 14, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Malicious actors that resemble approved users pose serious threats because they do not set off security alerts, according to the findings of Rapid7’s 2015 Incident Detection and Response survey. Additionally, security information and event management (SIEM) tools were insufficient to detect compromised credentials, according to the study, which garnered feedback from 271 security professionals from around the world.

      Nine in 10 respondents (90 percent) are concerned about the risks of compromised credentials, with 60 percent admitting that they have difficulty catching credential attacks today, according to the study.

      Why is it so difficult for most organizations to detect credential-related attacks? A lot has to do with how most security technologies are engineered.

      “For over a decade, most detection solutions have focused on malware that’s known—they’re not built to look for a malicious actor that looks like an approved user,” Matthew Hathaway, senior manager, platform development, at security specialist Rapid7, told eWEEK. “From phishing to maliciously accessing a database, attackers take a great deal of actions that fail to trigger alerts because, in isolation, they appear legitimate.”

      Another surprising finding concerned the use of SIEM technology, which security professionals often recommend as a tool to help track what is happening in an enterprise.

      “The survey respondents made it clear that simply deploying a SIEM is not enough to detect compromised credentials,” Hathaway said.

      According to the survey, 52 percent of respondents have a SIEM deployed, though only 40 percent indicated that they had the ability to detect credential attacks. Hathaway added that the survey results have led Rapid7 to infer that SIEM tools aren’t necessarily alleviating security professionals’ fears about compromised credentials.

      One reason SIEM technology might not be finding credential attacks properly is tied to the finding that not all organizations are monitoring user directory technologies, including Microsoft Active Directory and LDAP (Lightweight Directory Access Protocol). The survey found that only 52 percent of respondents are using their SIEM deployments to monitor Active Directory.

      One reason more organizations aren’t using a SIEM to monitor Active Directory is that collecting logs from it isn’t always a simple task, Hathaway said.

      Credential attacks aren’t the only visibility gap reported by the Rapid7 survey—the cloud also is an area of concern: 59 percent of respondents indicated that their organizations don’t have visibility into cloud services. A common way that organizations gain visibility into the use of cloud services is through the use of cloud access security broker (CASB) technologies. The CASB market was a hot one in 2015, with Blue Coat acquiring CASB vendor Elastica for $280 million and IBM launching its Cloud Security Enforcer CASB technology. The Rapid7 survey did not ask respondents if they are using a CASB technology, and Hathaway doesn’t see it as the answer to credential misuse in the cloud either.

      “While CASB does provide cloud services visibility, it does not solve the issue of compromised credentials,” Hathaway said. “If someone is on your network with valid credentials for one of your employees, they would still be able to access your organization’s data over a CASB.”

      Hathaway expects that, over the course of 2016, organizations will look to user behavior-based solutions for incident detection and response. “We also anticipate that more organizations will think about how they use their SIEMs strategically and will call into question whether or not they’re really meeting the needs of their modern environments,” Hathaway said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×