01.10.2021 Views

Cyber Defense eMagazine October Edition for 2021

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

To avoid those issues, cloud-focused security teams often rely on logs. However, it's impossible to log<br />

everything in cloud environments, limiting the amount of in<strong>for</strong>mation incident responders and threat<br />

hunters can use to conduct deeper investigations. Limited in<strong>for</strong>mation leads to limited insights and less<br />

context. Organizations must collect <strong>for</strong>ensic evidence, preserve the evidence, share in<strong>for</strong>mation across<br />

teams to establish the root cause, and pull together an actionable plan to contain and eradicate the risk<br />

or exploit from the organization’s digital environment, including cloud hosted assets.<br />

Collect Forensic Evidence<br />

Incident responders, <strong>for</strong>ensic analysts, and investigators working in cloud environments often find<br />

themselves in a challenging position. Most organizations’ security systems only offer an after-the-fact<br />

snapshot of a network intrusion with no context of the breach. The snapshot provides very limited insight<br />

and makes it extremely difficult to analyze the intrusion event accurately and comprehensively. Teams<br />

need richer <strong>for</strong>ensic evidence and technical detail than what is available in logs and data from agents<br />

and firewalls, but those response teams rarely have access to full network packet collection.<br />

The ability to look back retroactively to assess the entire “blast radius” <strong>for</strong> critical CVEs, exploits, rootkits,<br />

and zero-day attacks is priceless. Collecting and reviewing the comprehensive in<strong>for</strong>mation about the<br />

threat can highlight potentially vulnerable devices on the network leading both to expeditious remediation<br />

and mitigations of current risk, and a more comprehensive security strategy in the future.<br />

Complete visibility into captured live network traffic allows <strong>for</strong> analysis be<strong>for</strong>e, during, and after intrusion.<br />

For future breaches, packet capture and <strong>for</strong>ensics give SecOps teams the ability to reduce the time<br />

establishing the root cause, the cost of downtime on a system, and the overall impact of the breach.<br />

Collaborate across teams to establish root cause<br />

Remote work has made systems more vulnerable to breaches and communication between team<br />

members more difficult. HP Inc.’s Wolf Security Blurred Lines & Blindspots report found that hackers are<br />

increasingly targeting home workers resulting in a 238 percent increase in global cyberattack volume<br />

during the pandemic. There’s also a growing number of devices on the network and more business being<br />

conducted online, causing a rapid increase in network traffic and providing a larger attack surface <strong>for</strong><br />

threat actors.<br />

When <strong>for</strong>ensic analysts and incident responders are able to view metrics and packets from a single<br />

management interface with remote accessibility, the speed to a detection, and then resolution, is<br />

expedited. There’s great value in always-on incident response rather than IR that is focused only on<br />

retrospective investigation of specific security events.<br />

Blocking and containment alone are no longer enough to keep up with the advanced threats that typically<br />

land within an organization and pivot to their higher value targets. There’s a great need <strong>for</strong> deep<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>October</strong> <strong>2021</strong> <strong>Edition</strong> 80<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!