The perimeter of most organizations has changed, becoming almost ephemeral. Consider all the connections a modern business shares — from manufacturers, vendors, and customers to partners and outsourced specialists. For all of these and more, their perimeter becomes your perimeter. This makes attacking you much, much easier, and defending yourself much, much harder.
Your weakest link becomes the vector of infection, allowing threat actors to get inside your network and begin exfiltrating your data.
Cybersecurity defenses have not evolved at pace with the resourcefulness of threat actors. They have poor visibility into their true network surface area, and they have become comfortably cloistered by tools that supply them with thousands of false positives each day. Combined, this is a lethal cocktail for organizations.
For modern organizations to thrive today, they need visibility on all the other possible nodes of access through their third-party networks, and they need a way to prioritize evidence over indicators of compromise.
Karim Hijazi, who served as the director of intelligence of the cybersecurity firm Mandiant and now serves as CEO of the security firm Prevailion, said the hackers will likely have “gone to ground” at this point.
While threat actors like Cozy Bear and Fancy Bear get a lot of attention, there is another While threat actors like Cozy Bear and Fancy Bear get a lot of attention, there is another sophisticated crime actor that companies need to be watching out for.The group is called TA505 and it is believed to be […]
“This was the most pristine espionage effort, unlike anything we’ve seen in a very long time,” said Karim Hijazi, a former intelligence community contractor. “Everyone in the cybersecurity community is freaking out, because we don’t know where this could stop.”