5/2/2023 0 Comments Oo sound siphon for windowsWith everyone working from anywhere and using unmanaged devices and networks, there are an unprecedented number of entities and communications for security teams to track. To operationalize threat hunting in 2022, Lookout expects organizations will look into integrated endpoint-to-cloud security solutions that are cloud-delivered. Office of Management and Budget (OBM) provided funding guidance for federal agencies to adopt detection and response capabilities. The requirement for this is quickly becoming recognized, including with the U.S. One of the steps organizations need to take to tackle evolving threats is to leverage threat hunting, also known as detection and response. 3 - Converging technologies to bring threat hunting to a new level As we head into 2022, with hybrid and remote work cemented as the new norm, Lookout expects this to become an even bigger issue. Whether an employee accidentally shares a document with the wrong person or a compromised account extracts information, data now moves at lightning speed. Using apps like Workday, Salesforce, Slack, Google Workspace or Microsoft 365, we can share content and collaborate with others with very little friction.īut this interconnectivity also significantly amplifies the impact of any user errors or attacks. One of the major advantages of SaaS apps is the ease by which we can collaborate with colleagues, customers and business partners. 2 - User error and account compromises to become more pronounced An attacker could exploit this implicit trust between systems to siphon off sensitive data without anyone noticing. Once apps are connected to each other, seldom do enterprises monitor these automated workflows for changes in behavior. For example, it is very common for organizations to use HR software to capture an employee's personal and financial information, which is then shared to a payroll system. In addition to SolarWinds-type attacks, Lookout predicts threat actors to look into exploiting another seldomly-monitored area: cloud-to-cloud interaction. Now that this attack vector was proven to be successful, expect copycats to follow suit in 2022. This is a prime example of how a weak supply chain can be used to amplify the attack by taking advantage of cloud interconnectivity. federal agencies, were compromised by trojanized updates that opened backdoors to their infrastructure. More than 100 organizations, including nine U.S. In late 2020, the cybersecurity community uncovered one of the worst breaches in recent memory when the SolarWinds software-publishing infrastructure was infiltrated. The reality is that these apps constantly communicate with different entities and systems like software-update infrastructure and with each other - interactions that are often not monitored. We tend to think of cloud apps as disparate islands used as destinations by endpoints and end-users to collect and process data. One area organizations need to continue to monitor in 2022 is the software supply chain. 1 - Cloud connectivity and cloud-to-cloud connectivity will amplify supply-chain breaches Lookout, an endpoint-to-cloud cyber security company, have put together their cyber security predictions for 2022.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |