CISA Insights has posted a new bulletin urging US organizations to defend against potential critical threats, similar to the malicious attacks Ukraine is currently battling. CISA is warning and encouraging organizations to strengthen cybersecurity defenses against data-wiping attacks recently seen targeting Ukrainian government agencies and businesses.
Saryu Nayyar, CEO and Founder, Gurucul had this comment:
“The CISA’s guidance has several detailed measures that should be followed by every organization. One area of particular note is ‘identifying and quickly assessing any unexpected or unusual network behavior’. This is especially relevant when it comes to unusual communications, but also privileged access violations. In fact, another piece of guidance states: ‘take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic’. It is critical to monitor for and determine if access violations are taking place, but with stolen credentials commonly being used by attackers appearing valid to most detection solutions, this is really where behavioral analytics can determine if the access is indeed legitimate, suspicious or malicious and help security teams investigate further or rapidly respond.”
Clearly there’s a threat out there that the CISA is worried about, and given the which means that US organizations should take this seriously.
UPDATE: Antonio Martinelli, Director of Cyber Training at GRIMM had this additional commentary.
Attack surface reduction is a critical aspect of any Information Security program, yet something companies have consistently been struggling with since The Internet became ubiquitous. We’re seeing it’s easier now more than ever for employees to spin up new cloud resources and enroll in SaaS services without proper channels being involved, leading to companies being hit by attacks in these ever-expanding blind spots. A cyclical process of active asset inventory identification and subsequent attack surface assessment & reduction is mandatory in this day and age of Shadow IT complacency.
IT Leaders Prioritize Secure Remote Work: Citrix
Posted in Commentary with tags Citrix on January 19, 2022 by itnerdTwo years ago, IT leaders were forced into remote work. Many viewed it as a temporary experiment. Today, they see it for what it is: the future of work. And they’ve made it their top priority. According to the results of a Pulse survey conducted by Citrix Systems, Inc., 100 percent of 400 IT and security leaders across North America, EMEA, and APAC have adopted the hybrid model, and rank enabling it as job number one for their organizations.
Leading the Charge
Business leaders who once bristled at the idea of remote work because they didn’t think employees could deliver outside the office now see the benefits it can deliver in terms of employee productivity and experience. They are calling on IT to enable it, and as revealed by the Citrix-Pulse survey, they’re answering.
When asked to rank their top five priorities over the next five years, respondents said:
Leaping Hurdles
But they’ll face some challenges in executing. When asked to identify the top obstacles to driving digital transformation, Citrix survey participants cited:
Lack of understanding the needs across the business to effectively prioritize investments (41 percent)
Cumbersome, complex infrastructure (34 percent)
Lack of investment in cloud (24 percent)
Security is also a concern. When asked what they see as the top risks opened by remote and hybrid work, those polled called out:
And, their teams are stretched to the max, with respondents noting:
Pushing Forward
How do the leaders polled plan to overcome these challenges? By focusing on seven key things:
You can find the full survey here.
Leave a comment »