Fueled by the success of profile
hacks, Fortinet expects to see continued innovation among cybercriminals with an even greater
focus on deceiving and evading existing security solutions. Malicious hackers have
attempted to conceal malware by using different file types and compression
schemes with the intent to exploit weaknesses in traditional means of network
protection. We also anticipate an increase in sophisticated malware platforms
that can be customized for targeted attacks. Once malware has breached a
network, it will, either automatically or under control of cybercriminals,
morph, adapt, and move about undetected for as long as possible, mining data
ranging from customer records and intellectual property to device profiles and
employee credentials.
If security controls cannot detect the malware or its communication during this period, then it’s only a matter of time before collected data is staged and exfiltrated, that is, sent back to the cybercriminal. There is no “silver bullet” to protect organizations against the types of advanced targeted attacks outlined above. Rapid innovation on the malware front, frequent zero-day attacks, and emerging evasion techniques can all render any single approach ineffective at preventing tailored intrusion. Instead, the most effective defense is founded on a cohesive and extensible protection framework. This framework incorporates current security capabilities, emerging technologies and a customized learning mechanism that creates actionable security intelligence from newly detected threats. The latter component is arguably most critical to staying ahead of the threat curve. How effective will the Prevent-Detect-Mitigate Framework be in resolving cyber threats? Share your thoughts with the Cloud and Cyber Security Center. Graphic provided care of Fortinet.
If security controls cannot detect the malware or its communication during this period, then it’s only a matter of time before collected data is staged and exfiltrated, that is, sent back to the cybercriminal. There is no “silver bullet” to protect organizations against the types of advanced targeted attacks outlined above. Rapid innovation on the malware front, frequent zero-day attacks, and emerging evasion techniques can all render any single approach ineffective at preventing tailored intrusion. Instead, the most effective defense is founded on a cohesive and extensible protection framework. This framework incorporates current security capabilities, emerging technologies and a customized learning mechanism that creates actionable security intelligence from newly detected threats. The latter component is arguably most critical to staying ahead of the threat curve. How effective will the Prevent-Detect-Mitigate Framework be in resolving cyber threats? Share your thoughts with the Cloud and Cyber Security Center. Graphic provided care of Fortinet.
No comments:
Post a Comment