• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

PodChats for FutureCIO: CISO tactics to enhance cyber threat readiness

Allan Tan by Allan Tan
November 8, 2021
PodChats for FutureCIO: CISO tactics to enhance cyberthreat readiness

PodChats for FutureCIO: CISO tactics to enhance cyberthreat readiness

Cybersecurity firm IntSights has released its latest research white paper ‘Selling breaches: The Transfer of Enterprise Network Access on Criminal Forums’ which delves into the sale and purchase of unauthorized access to compromised enterprise networks and how such activities have become a significant enabler for criminal cyberattacks, particularly ransomware infections.

With the shift to a remote workforce, the resulting increase in the use of remote access tools and services have given attackers more attack surface to exploit and fuelled the marked increase in the sale of access to compromised networks.

According to Paul Prudhomme, head of threat intelligence advisory at IntSights, there is a disproportionate focus in the US and other industrialised countries, which are just popular targets for crime in general because they're more lucrative for criminals.

“By analysing the statistics, the sales of the technology and telecom companies are the most popular targets by just a bit, followed closely in second place, financial services, healthcare and energy and industrials,” he added.

Source: IntSights 2021

Fuel for cyber attackers

Prudhomme acknowledges what has been observed since the start of the pandemic. Criminal elements are taking advantage of the inherent holes in the infrastructure, particularly around the defences.

Cybercriminals are using known vulnerabilities in many of the foundation technologies used to connect people, businesses, and organisations. For instance, Remote Desktop Protocol (RDP) is part of the operating system of most client devices and is used to control these remotely.

A vulnerability of RDP that is commonly exploited is unrestricted port access (Port 3389). Attackers can use this port to carry out on-path attacks.

According to Prudhomme, brute force attacks are commonly used against RDPs for use in general as well as ransomware operations. The other common target following COVID-19 is virtual private networks (VPNs) which have grown in popularity as enterprises mandate large masses of remote work. The very same technology that is supposed to provide a secure connection between servers and applications and the users accessing these can also be used to infiltrate infrastructure.

He pointed out that VPNs that aren’t updated are the other pathways to infiltrating the network. Unfamiliarity with configuring VPNs is an easy access pass to compromising networks.

Prudhomme is careful to not dismiss the value of VPNs, saying: “Just because it can be compromised, doesn't mean you shouldn’t use it. I mean every line of defence will have a possibility in it. So ultimately, a robust security posture will have multiple lines of defence behind it. So, if one layer of defence fails, you still have several other ones that can stop an attack,” he elaborated.

The other option is social engineering attacks – sending people links to download what users think are legitimate communications.

Tradeoffs

Prudhomme remains a proponent of multiple lines of defence, commenting that a layered defence offers multiple means of protection.

Asked whether such a posture introduces latency to the overall performance of the network or applications, he acknowledges that there will always be trade-offs between usability and security.

“Security is often inconvenient. That is the nature of the beast. With that said, there are some things that one can do that that have very little or just a minor impact on usability,” he explained.

He cited the use of two-factor authentication as a proven means of protecting accounts. An attacker may somehow acquire a user’s access name and password but without the third code, they should not be able to get access.

He acknowledged that two-factor authentication processes will continue to evolve as attackers figure out a way to circumvent these technologies. “The two-factor authentication does add a degree of inconvenience. I think the value that it adds to the defence is worth that relatively modest amount of inconvenience,” he opined.

No security is perfect

Prudhomme does not deny that the imperfections in security solutions. Both VPNs and two-factor authentication are not immune to attacks. By employing multiple lines of defence, he is of the opinion that at some point one, if not several, of those will fail. “Let’s hope that at least one will hold,” he called out.

Asked whether a zero-trust concept is a more secure approach to prevent attacks. He reiterated that ‘there is no such thing as perfect security.’

“I think zero trust reduces that vulnerability in so far as the attackers like to abuse that trust. And if there's no trust for them to abuse, that does make it harder for them to do their job. Not impossible, but it still makes their lives harder,” he added.

Employing multiple defence strategies has the potential to deter attackers that are looking for an easy target. “If they find that a potential victim is simply too hard to compromise. Not impossible, but just too hard. It's too much work, they'll just go somewhere else,” he continued.

The only time this approach doesn’t work is against state-sponsored attacks. In these situations, a target is the target and no one else. “If they want you, they will get you. And they will throw everything at you until they get what they want. But for [common] criminals at least, if you just make their lives difficult, you can eventually deter them,” concluded Prudhomme.

Click on the PodChat player and listen to Prudhomme share highlights of the report as well as insights into strategies for improving cyber defences in 2022.

  • how the surge in demand for sales of compromised network access can lead to significant enablers for ransomware attacks
  • opportunities for security professionals to use intelligence to detect and thwart attacks
  • what organisations can do to improve security hygiene and prevent the network compromise events
Related:  ExecOpinion: Reengineering FSI cybersecurity for 2024
Tags: cyber threatsIntSightslayered defencePodchatsransomwareTwo-Factor Authenticationvirtual private networkvpn
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe