02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ransomeware Hackers May Be Hidden in Your Network <strong>for</strong> Months<br />

• JBS May 31, 2021. JBS is one of the largest meat suppliers in the US. Hackers caused it to<br />

temporarily halt operations at its five largest US-based plants. The ransomware attack also<br />

disrupted the company's Australia and UK operations. JBS paid the hackers $11 million in<br />

ransom money. The hackers began with a reconnaissance phase in <strong>February</strong> 2021, followed<br />

by Data Exfiltration from March 1 to May 29, 2021.<br />

• Colonial Pipeline May 6, 2021. The largest refined’ products pipeline in the US went offline on<br />

May 6 h . The pipeline covers 5,500 miles and transports 100 million gallons of fuel daily. The<br />

hackers gained access to their network April 29. On May 6 Data Exfiltration began with the<br />

hackers stealing 100 gigabytes of data be<strong>for</strong>e locking Colonial Pipeline computers with<br />

ransomeware. The pipeline paid hackers $4.4 million in ransom money on May 7th.<br />

• CNA Financial March 23, 2021. CNA Financial, the seventh largest commercial insurer in the<br />

US announced it had sustained a sophisticated cybersecurity attack. CNA Financial eventually<br />

paid $40 million in May 2021 to get its data back.<br />

Conventional approaches to cyber security may not prevent Data Exfiltration and Data Breaches. In<br />

2020 the DHS, Department of State, U.S. Marine Corps and the Missile <strong>Defense</strong> Agency recognized this<br />

and all issued requests <strong>for</strong> proposals (RFP) <strong>for</strong> network full packet data capture <strong>for</strong> Deep Packet<br />

Inspection analysis (DPI) of network traffic. This is an important step <strong>for</strong>ward protecting confidential<br />

database data and organization in<strong>for</strong>mation.<br />

Zero-day vulnerabilities that allow hackers to gain system privileges are a major threat to all<br />

organizations encrypted and unencrypted confidential data. Confidential data includes: credit card, tax<br />

ID, medical, social media, corporate, manufacturing, trade secrets, law en<strong>for</strong>cement, defense, homeland<br />

security, power grid and public utility data. This confidential data is almost always stored in DB2,<br />

In<strong>for</strong>mix, MariaDB, Microsoft SQL Server, MySQL, Oracle, PostgreSQL and SAP Sybase databases.<br />

How to Stop Data Exfiltration and Data Breaches with Deep Packet Inspection<br />

Protecting encrypted and unencrypted confidential database data is much more than securing<br />

databases, operating systems, applications and the network perimeter against Hackers, Rogue Insiders<br />

and Supply Chain Attacks.<br />

Non-intrusive network sniffing technology can per<strong>for</strong>m a real-time Deep Packet Inspection (DPI) of<br />

100% the database activity from a network tap or proxy server with no impact on the database servers.<br />

The database SQL activity is very predictable. Database servers servicing 1,000 to 10,000 end-users<br />

typically process daily 2,000 to 10,000 unique queries or SQL commands that run millions of times a day.<br />

Deep Packet Analysis does not require logging into the monitored networks, servers or databases. This<br />

approach can provide CISOs with what they can rarely achieve. Total visibility into the database activity<br />

24x7 and 100% protection of confidential database data.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!