Network Security, Cloud Security
Eliminate threats hiding in the network

Today’s columnist, Martin Roesch of Netography, explains why security teams need tools that deliver visibility both on-prem and in the cloud. (Stock Photo, Getty Images)
As the composition of the enterprise network has changed over the years, an ever-expanding set of risks and exposures have come along with it. The network has become more dispersed, living on-prem and in the cloud, and the capabilities we’ve relied on historically for network defense have lost effectiveness to the point where security pros often have incomplete ideas regarding where to focus their security efforts and capabilities.We often don’t know the security of a network until it’s too late. So if what we have relied on historically no longer works, what do we use now to identify these threats and how do we root them out?A front-and-center example are hostile actors launching ransomware campaigns. Once they infiltrate a network, they quietly deploy their ransomware. Operating freely without risk of being discovered by leveraging tools that are commonly used in the enterprise, they go about their business and wait for the right time to activate the ransomware.But there are also many unknowns, the bad activities happening that we don’t have any way to get our arms around. They are often policy or governance issues like bitcoin mining or employees using company resources to host a gaming server. With limited mechanisms for finding them, these types of activities often go on unnoticed for long periods of time. Data exfiltration also fits this description, in many cases taking months before being discovered because traditional tools have major gaps in coverage and scope that let hostile actors operate unnoticed in most enterprise networks. In worse case scenarios, it’s not until the attacker surfaces that an organization becomes aware of the compromise. Recent research from IBM’s Cost of a Data Breach Report 2023 found that more than one-quarter or 27% of breaches were disclosed by the attacker as part of a ransomware attack. Attacks disclosed this way cost significantly (19.5%) more than if discovered by their own tools.
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds