Virtualization Technology News and Information
Article
RSS
enSilo 2018 Predictions: How Attacks will Reshape the Cybersecurity Market

VMblog Predictions 2018

Industry executives and experts share their predictions for 2018.  Read them in this 10th annual VMblog.com series exclusive.

Contributed by Roy Katmor, CEO, enSilo

2018 on the Horizon: How Attacks will Reshape the Cybersecurity Market

This year saw massive attacks and breaches. We expect nothing less in 2018. What needs to change most, however, is the industry's response to the continuing barrage of threats and what that means in the cybersecurity marketplace. While vendors continue to develop new tools and technologies, few are bringing to market solutions that make real, material impact. Security teams are still vexed by the lack of qualified operators while relentless attacks continue to face the enterprise. As a result, expect to see a shift in positioning of security service providers while the cream of the vendor solution market rises to the top. Here are the trends that will shape cybersecurity in 2018:

The cost of disruption continues to skyrocket

WannaCry and NotPetya ransomware hit a number of industries in an unexpected wave of attacks.  Many people think that WannaCry was an attacker's "test run", but it still took down 85% of Telefonica, one of the largest private telecommunications companies in the world.  WannaCry is a representation of how a cyber attack can all but destroy a company's operations by paralyzing things like hospital, communications and transportation systems, going beyond the usual malware goal of simply stealing data.  Following the trajectory of ransomware and similar data-wiping attacks, we predict increasingly destructive incidents will occur that critical infrastructures - an event that could thrust the cost of disruption to astronomical levels.

Extortion and damage-motivated attacks will continue to target industries that attackers believe will pay out to restore operations and cut losses. Organizations with high uptime requirements necessitated by laws or competition are prime targets - think hospitals, banks, telecommunications firms and cloud providers.

Ransomware will advance in distribution methods causing an even greater surge than what we saw in 2017.  Ransomware is good business for attackers these days and will continue to be financed by its victims - consumers and enterprises alike.

Moreover, attackers will start to leverage new fileless techniques to bypass security measures that have caught up to more "traditional" attacks.  Disruption will continue to occur, costing thousands to billions of dollars in loss of operation.

The preferred methods of attack will change

Fileless attacks will capitalize on novel exploitable surfaces like Powershell  and Metasploit.  Additionally, code injection methods such as AtomBombing and Process Doppelgänging, are other recently discovered critical weaknesses that will need to be addressed with high-priority. These novel attack methodologies will undoubtedly cause a seismic shift in the future threat landscape.

As this happens, fileless attacks will become increasingly common. Designed to function completely within the memory of a system and leave no evidence, these attacks open up victims to a Pandora's Box of malicious behavior that typically go undetected. Fileless attacks usually occur for an extended amount of time prior to the targeted victim identifying the attack.

Similarly, expect that code injection methods, which leverage operating systems with the ability to bypass conventional security methods, will continue to be found in the wild. Also, don't be shocked when malware bypasses written in Linux binary impact Mac systems that doesn't know how to inspect for this kind of exploit.

The good news is that exploitation mitigation is getting better and vulnerability exploits are only getting more costly for attackers. The bad news is that you will likely see an even greater increase in social engineering-based attacks and fewer vulnerability exploits as a result.

SOC teams will be flooded by targeted indicators origin DDoS attacks

Around 79% of security professionals report being overwhelmed by the inundating number of threat alerts they are faced with. Alert fatigue plagues the industry and is a difficult problem to manage on most enterprise security platforms. There are a number of other issues at play that negatively impact the marketplace today.

Security operations center (SOC) operations are hindered by the lack of talent and the number of security experts available to fill their teams. Incident Response teams can't prioritize among the barrage of alerts and threats. Response times for legitimate critical alerts go unnoticed resulting in outages and downtime. Dwell time is increasing and it's unsustainable.

In 2018, we predict to see SOC and incident response teams completely weighted down with targeted indicators origin DDoS attacks, aiming to completely paralyze the incident response processes, camouflaging other backchannel attacks. As a result MSSPs will accelerate their adoption of a model more akin to incident response focused services a.k.a. Managed Detection and Response (MDR) services. Leaders and service providers in the industry will be forced to look past indicator based alerts - what most security teams do in a day is the opposite of an efficient solution.

Instead of focusing the time and resources of an entire SOC team on hunting potential breaches in real time, following methodologies that don't work and the constant triage of doubtful indicators of attack/compromise, there is much more power and value that can be gained by an on-demand team focused on advanced detection and aggressive real-time response. Following the MDR model, if the right operators are armed with the right tools, a combination of automation and orchestration capabilities aligned with pre- and post-infection real-time protection measures, enterprises will save on personnel costs while maintaining a significantly more secure and manageable environment.

##

About the Author

roy katmor 

Roy Katmor is a 15-year seasoned product manager and security market strategist, combining strong technical knowledge with proven sales and marketing skills. Prior to enSilo, Roy led Akamai's security strategy. Before that, he managed Imperva's data security products and architecture management. Additionally, Roy held various product management and R&D leading roles at several international public and privately-held companies. Roy holds a BSc in Information Systems from the Technion, Israel Institute of Technology, and MBA in finance and business strategy from the Hebrew University.  

Published Thursday, December 28, 2017 7:49 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<December 2017>
SuMoTuWeThFrSa
262728293012
3456789
10111213141516
17181920212223
24252627282930
31123456