One Article Review

Accueil - L'article:
Source Anomali.webp Anomali
Identifiant 8289565
Date de publication 2022-12-08 19:03:00 (vue: 2022-12-09 15:05:39)
Titre Why Understanding Your Attack Surface is Imperative
Texte We live in a world of constant change. Digital transformation has fundamentally changed the way we work, play, learn, shop, travel, communicate, connect, collaborate, create, consume media, earn income, and even sleep. These changes have brought about new risks, challenges, and opportunities for innovation, efficiency, and growth. As the pace of change accelerates, organizations must adapt their business models, processes, and technologies to remain competitive. Digital transformation isn’t just about moving to the cloud, adopting new technologies, or building better apps. It’s also about protecting those investments and ensuring they’re protected from the beginning. This means taking a holistic approach to cybersecurity, including addressing the entire attack chain from end to end. To do so, organizations need to leverage technology to improve operational efficiencies while ensuring security and compliance. But doing so requires them to rethink many aspects of their current operations — including their network architecture, application development lifecycle, data center design, and cybersecurity strategy. Increasing Concerns and Challenges With the rapid expansion of cloud computing, mobile devices, social networking, big data analytics, and virtualized environments such as private clouds, public clouds, and hybrid clouds, enterprises now face significant challenges in managing all the various components involved in their IT infrastructure. They are forced to reevaluate their existing approaches to manage their networks, servers, applications, storage systems, and endpoints. And yet, despite the growing complexity, plenty of things still need to be clarified about the required solutions and how to deploy them efficiently. In addition to the traditional concerns regarding performance, availability, scalability, reliability, and security, organizations must consider the effects of digital transformation on their physical environment. For instance, as companies move toward using software-defined everything (SDX), the attack surface expands exponentially. Even if a company has a robust SDN solution, it may not be enough to protect itself from an advanced persistent threat (APT) or a targeted attack. There are many ways to classify APTs, but they share one common characteristic — they are highly targeted, stealthy, and extremely effective. Cyber Attacks and Attackers Evolving Today’s sophisticated attackers can exploit vulnerabilities in any aspect of the organization’s IT infrastructure, whether it’s a desktop operating system, server, router, firewall, VPN gateway, endpoint device, or cloud provider. A successful attacker could compromise an employee’s computer, gain access to sensitive corporate files, steal intellectual property, destroy critical production assets, disrupt operations, or cause catastrophic damage. As the number of connected devices continues to grow, the sophistication of cyber attacks targeting these devices is increasing. Advanced persistent threats are often referred to as “one-stop shops” because they simultaneously aim at multiple targets. Many APTs operate continuously without ever stopping to download updates or install patches. Defining Your Attack Surface Attack surfaces are comprised of all the technology that exists inside an organization. This includes computers, mobile devices, applications, networks, operating systems, browsers, network infrastructure, cloud computing platforms, email servers, databases, storage, and many others. Attack surfaces represent the potential vulnerabilities that could allow attackers to gain unauthorized access to internal resources and data. For example, a typical company might use a combination of Microsoft Windows XP, OS X 10.7 Lion, iOS 5.0, and WebKit browser versions 4.0 - 6.0. Each of these components represents a point of entry for malicious code, including viruses, spyware, Trojans, worms, expl
Envoyé Oui
Condensat “one about accelerates access accordingly account actionable actively activity adapt add addition additional additionally address addressing adequate adopting advanced adversaries after again against aim all allow allows also amount analytics analyzes and/or anomali’s anticipate any application applications applied apply approach approaches apps apt apts architecture are areas as: asm aspect aspects assess assessment assessment: performing asset assets assets represents attack attack’s attacker attackers attacks attention audits availability avenues back because become becomes been begin beginning behavior behind being better between beyond big broader brought browser browsers bugs building business businesses but bypass call can can’t cannot case catastrophic cause center chain challenges change changed changes channels characteristic check clarified classify cloud clouds code collaborate collection combination common communicate companies company competitive competitors complexity compliance component’s components comprehensive comprise comprised compromise compromised computer computers computing concept concepts concerns conduct configured connect connected connectivity consequently consider constant constantly consume context contextual continue continues continuing continuous continuously controls core corporate could counter countless create critical crucial current customer customers cyber cybercriminals cybersecurity daily damage data databases datasheet date dates day days decisions defend defenses defined defining denial deploy deployed deployment design desktop desktops; despite destroy detecting determine determined determines determining develop development device devices devise different difficult digital discovered discovery discovery: identifying disgruntled disrupt doing door download each early earn easier effective effects efficiencies efficiency efficiently efforts either eliminate email emerging employee’s employees enable enables end endpoint endpoints enough ensure ensuring enterprise enterprises entire entity entry environment environments established even ever every everything evolving example exfiltrate existing exists expands expansion exploit exploitable exploitation exploited exploiting exploits exponentially exposed exposes exposure external extremely face facebook features files finally firewall firewalls first fix flagging focus focusing following footprint footprints forced foundation fraudulent frequently from fundamentally future gain gains gaps gateway generated goal goes grow growing growth hand happening harder hardware has have help helps highly hijacking historical holistic how however hybrid identifiable identification: taking identified identifies identify identifying impact imperative implementation implementation: when implementing improve include includes includes:  including income increasing increasingly individual information infrastructure initial innovation inside insights install instance intellectual intelligence interacting internal introduce inventory investment investments involved ios isn’t it’s its itself just know known lack laptops large larger laterally learn left levels leverage lies lifecycle like likeliest likelihood lion live long maintaining make makes malicious malware manage management managing many mapping massive matters may means measure measures media merely messaging microsoft might misconception miss mitigate mobile models monitor monitoring monitoring all monitoring: implementing more most move moving much multiple must need needed needs network networking networks new next not nothing now number observing often once one ones ongoing open operate operating operation operational operations opportunities organization organization’s organizations other others out outside overlook pace part partners party passively patch patches people perceived perform performance perimeter periodic periodically persistent person personally phones physical picture pii plan p
Tags Vulnerability Threat
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: