The mission of Evidence of Compromise is simple: empower companies to audit and continuously monitor the security of their supply chains to an unprecedented degree, with the possibility of even predicting future breaches based on this real-time intelligence.
Current methods of cyber risk management, incident response and risk modeling have failed to keep up with the growing sophistication and speed of cyber adversaries, which range from organized criminal groups to state-sponsored hackers. As geopolitical tensions increase around the world, they are accelerating the overall risk for the financial sector, as this industry remains a prime target for US adversaries.
Over the next few years, the financial industry will have to evolve its cyber intelligence operations to keep up with these rapidly advancing threats by shifting to a more reliable, actionable and machine-speed response capability. This will require that it move beyond the standard model of threat intelligence, which for over 20 years has been based largely on the highly imperfect “indicators of compromise” (IoC).
This legacy threat intelligence model has been problematic for companies in many ways, particularly due to its high rate of false positives and its slower method of execution, since the data must be carefully culled through, refined and verified by human analysts.
To keep up with modern threats, the industry will have to pivot toward a new and far superior class of threat intelligence, known as “evidence of compromise” (EoC). Unlike IoC, EoC is not at risk of errors, doesn’t require human analysts and is instantly actionable. That is because the data is collected directly from the source — the attacker’s own infrastructure — rather than relying on guesswork and interpretation. This means EoC is inherently accurate, with a false positive rate of at or near 0%.
The financial sector has been at the forefront of cybersecurity for years, so much so that its networks are often difficult to breach directly. As a result, attackers are increasingly shifting to the financial sector’s periphery, by targeting lower-hanging fruit within the corporate supply chain.
The “trusted vendor” is now the greatest vulnerability in a financial company’s network and overall security. Until now, it has been exceedingly difficult for these companies to accurately gauge their vendors’ security, particularly when it comes to active and emerging threats. EoC changes this equation, by allowing a company to see its vendors’ networks from the perspective of the attackers who are actively breaching them, gaining persistence and migrating to new targets affiliated with that organization.
This is a significant advancement over current threat intelligence capabilities, and it will become increasingly necessary in the next decade, as the threat landscape continues to evolve.
Undoubtedly, news that a Florida water plant had been hacked raised a lot of alarms outside the cybersecurity industry. The idea that a water source could be contaminated hit home for many Americans, highlighting the vulnerability of the nation’s utilities and critical infrastructure. But this attack came as no surprise to security experts. It was […]
Despite the many regulations from GDPR to CCPA, HIPAA, and PCI DSS that mandate a company report a data breach, many corporate hacks go unreported. Certainly, compliance is a driving force for the organizations that do report a data breach. Still, in 2019, CSO Online reported that the FBI’s Internet Crime Complaint Center received reports […]
Over a decade ago, security researchers at Microsoft identified a computer worm and dubbed it Ramnit. The malware family, “infects Windows executable files (.EXE) and HTML files (.HTML). It can also give a malicious hacker access to your PC. It spreads through infected removable drives, such as USB flash drives,” Microsoft warned. Fast forward to […]