Cloud-based Security: Future of the Industry?
“Having a cloud-based architecture will allow organizations to instantly crowdsource adversary tradecraft intelligence in real-time and co-relate it with historical data”
The argument he makes is a very important one and actually applies to any on-premise security technology. And, the most prolific attacks today are often bankrolled by nation-states seeking to gain intelligence for commercial or political interests, or by well-funded criminal groups. With the resources that an intelligence agency can devote to setting up cutout entities to conduct covert purchases or even interdict equipment during shipping, you simply have to assume that any openly available software or hardware-based security technology can be acquired by a sophisticated adversary. Then, once the product is procured by an adversary or intelligence organization, one must assume that they have deployed the equipment in their labs and that significant resources have been expended on breaking it. With simple reverse-engineering processes, adversaries are able to find every way possible to bypass the technologies–without getting caught or, often times, without leaving a trace. Because of this, every single on-premise technology is set to fail in the face of advanced and well-resourced attackers. If an adversary has unlimited time and resources to find a vulnerability, they will. And, they’ll probably find the best way in.
When it comes down to it, there are only two real options for responding to cyber threats in today’s landscape.
The first option is to try to build your own security tools (and not share them with anyone, of course) and hope that an adversary has not been able to acquire your custom-built solution from your network. This is the option that Alex advocates but unfortunately, few organizations have the resources and capabilities of large organizations such as Yahoo or Facebook to have their own security technology engineering teams. It’s simply not a realistic option for the vast majority of companies out there due to the heavy time investment, expense, and talent scarcity.
The alternative option is to leverage a cloud-based security technology which can record every execution event in real-time and transmit it to the cloud where an adversary can’t easily destroy it without getting caught. This way, as we now have to assume, if a hacker manages to procure a copy of the software utilized in the cloud implementation, they cannot realistically test it offline in their lab. In fact, if they run tests on cloud-based security technology, they will immediately reveal all of their tradecraft–enabling the organization to trigger immediate investigation, protect any vulnerability they may have discovered and prepare accordingly. At the same time if the hacker chooses to disconnect the software completely from the cloud, they won’t know how their attack will truly perform in the real world where you have to deal with the reality of a cloud connection. (Terminating the connection as a first step of an attack is also problematic as the effects of that are also observable in the cloud and can trigger immediate investigation and action).
Ultimately, what organizations need in the face of the diminishing effectiveness of anti-virus technologies is the ability to learn and adapt from every attack an adversary attempts against the technology–no matter the infiltration method. Having a cloud-based architecture will allow organizations to instantly crowd source adversary tradecraft intelligence in real-time and co-relate it with historical data.
Today’s threat landscape is dynamic and sophisticated. Attack techniques are ever changing–becoming faster, stealthier and more successful against traditional security methods. The lesson that companies across the globe can glean is the need to change the way they approach security. Turning to the cloud drives the advantage back to the defender.
Today's Threat Landscape Requires Adaptive Security
Staying Abreast of Application Development and Delivery
How to Ensure Information Security when Outsourcing Your Projects
This Is How Your Computer Gets Hacked!
By Pete V. Sattler, VP-IT & CIO, International Flavors &...
By Benjamin Beberness, CIO, Snohomish County PUD
By Gary Watkins, CIO of IT Shared Services, KAR Auction...
By Tonya Jackson, VP Global Supply Chain, Lexmark
By Chad Lindbloom, CIO, C.H. Robinson
By Ryan Fay, CIO, ACI Specialty Benefits
By Kris Holla, VP& CSO, Nortek, Inc.
By Shawn Wiora, CIO & CISO, Creative Solutions In Healthcare
By Michael Alcock, Director-CIO Executive Programs &...
By Jeff Bauserman, VP-Information Systems & Technology,...
By Wes Wright, CTO, Sutter Health
By Peter Ambs, CIO, City of Albuquerque
By Mark Ziemianski, VP of Business Analytics, Children's...
By Jonathan Alboum, CIO, The United States Department of...
By Ryan Billings, MS, MBA, Executive Director, Digital...
By Christina Clark, Managing Principal, Cresa
By Evan Abrams, Associate, Steptoe & Johnson LLP
By Holly Baumgart, Vice President-Information Technology,...
By Melissa Douros, Director of Digital Product Management,...
By Andrew Palmer, SVP & Chief Information Officer, U.S....