At Your Fingertips
Security Advisor Middle East|February 2019

MOREY HABER, CTO, BEYONDTRUST, SHARES INSIGHTS INTO HOW ORGANISATIONS CAN LEVERAGE PAM FOR EFFECTIVE CYBER FORENSICS AND SECURITY BREACH REMEDIATION.

At Your Fingertips

No one wants to respond to a security incident or a breach, particularly at the start of a new year! Instead, the highest priority should be to stop a cyber threat before it compromises the organization. But in reality, preventing a cyber attack from landing is not always possible. The steps for the incident or breach identification - from threat hunting to searching for explicit Indicators of Compromise (IoC)—are well established. While the processes will vary from organization to organization, malware, compromised accounts, lateral movement, etc. will all need to be addressed as a part of any formal clean-up plan.

If a breach is severe enough organizations may have no choice other than to reinstall the entire environment from scratch. While that is a worst-case scenario, it does happen. In many cases, businesses may choose to scrub servers as best as possible versus performing a complete reinstall. That is a business decision based on risk, feasibility, and cost. It also represents a no-win scenario if the threat is a persistent presence that uses techniques to evade traditional identification measures. If you think that is far-fetched, just look at the history of threats like rootkits, Spectre, and Meltdown that prove that there is always a way to attack a technology resource.

Threat actors are after your credentials

Regardless of your remediation strategy, you can be assured that, via some fashion or another, threat actors will have access to your credentials. This implies that any clean-up effort should not reuse any existing passwords or keys. If possible, you should change (rotate) all credentials across every affected or linked resource. This is where Privileged Access Management (PAM) comes into play. The clean-up or redeployment needs to be protected from password reuse or from a threat actor regaining a persistent presence due to poor credential management, as remediation efforts begin.

Esta historia es de la edición February 2019 de Security Advisor Middle East.

Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 8500 revistas y periódicos.

Esta historia es de la edición February 2019 de Security Advisor Middle East.

Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 8500 revistas y periódicos.

MÁS HISTORIAS DE SECURITY ADVISOR MIDDLE EASTVer todo
KASPERSKY SHEDS LIGHT ON THE RANSOMWARE ECOSYSTEM
Security Advisor Middle East

KASPERSKY SHEDS LIGHT ON THE RANSOMWARE ECOSYSTEM

Ransomware is on the tip of everyone’s tongue every time businesses discuss cyber threats they are likely to face in 2021.

time-read
3 minutos  |
May 2021
GAJSHIELD: ENABLING CONTEXTUAL VISIBILITY FOR OPTIMUM DATA PROTECTION
Security Advisor Middle East

GAJSHIELD: ENABLING CONTEXTUAL VISIBILITY FOR OPTIMUM DATA PROTECTION

HARRISON ALBERT, REGIONAL DIRECTOR, D-LINK MIDDLE EAST AND AFRICA, TELLS SECURITY ADVISOR MIDDLE EAST HOW GAJSHIELD’S CONTEXT-BASED APPROACH TO SECURITY HELPS ORGANISATIONS FIND ANOMALIES, REDUCE FALSE ALARM AND PREVENT INTENTIONAL & UNINTENTIONAL DATA EXPLOITATION.

time-read
3 minutos  |
May 2021
THALES ANNOUNCES NEW SOLUTIONS TO HELP OGANISATIONS DISCOVER, PROTECT AND CONTROL SENSITIVE DATA IN MULTICLOUD ENVIRONMENTS
Security Advisor Middle East

THALES ANNOUNCES NEW SOLUTIONS TO HELP OGANISATIONS DISCOVER, PROTECT AND CONTROL SENSITIVE DATA IN MULTICLOUD ENVIRONMENTS

THALES HAS ANNOUNCED NEW DATA PROTECTION SOLUTIONS FOR GOOGLE CLOUD, MICROSOFT AZURE, AND AMAZON WEB SERVICES, SOLIDIFYING ITS ROLE AS A TRUSTED THIRD PARTY FOR MULTI-CLOUD DATA SECURITY.

time-read
3 minutos  |
May 2021
RANSOMWARE RECOVERY COST FOR UAE IN 2021 IS $517,961: SOPHOS SURVEY
Security Advisor Middle East

RANSOMWARE RECOVERY COST FOR UAE IN 2021 IS $517,961: SOPHOS SURVEY

THE SURVEY POLLED 5,400 IT DECISION MAKERS IN MID-SIZED ORGANISATIONS IN 30 COUNTRIES ACROSS EUROPE, THE AMERICAS, ASIA-PACIFIC & CENTRAL ASIA, THE MIDDLE EAST, AND AFRICA.

time-read
5 minutos  |
May 2021
OVERCOMING THE CYBER-PANDEMIC
Security Advisor Middle East

OVERCOMING THE CYBER-PANDEMIC

ABHIJIT MAHADIK, DIRECTOR, CYBERSECURITY & INFRASTRUCTURE – UAE & KSA, RAQMIYAT SPEAKS TO SAME ABOUT THE EVOLVING CYBERSECURITY LANDSCAPE, THE THREATS ORGANISATIONS NEED TO WATCH OUT FOR AND HOW THE SECURITY PRIORITIES OF ORGANISATIONS HAVE SHIFTED SINCE THE PANDEMIC LAST YEAR.

time-read
4 minutos  |
May 2021
FORTINET: MAKING A MARK @ GISEC
Security Advisor Middle East

FORTINET: MAKING A MARK @ GISEC

ALAIN PENEL, REGIONAL VICE-PRESIDENT, MIDDLE EAST & PAKISTAN AT FORTINET, EXPLAINS WHAT IT MEANS TO BE A PART OF GISEC THIS YEAR AND HOW FORTINET’S CUTTING-EDGE SOLUTIONS CONTINUE TO PROVIDE MAXIMUM PROTECTION AGAINST CYBERTHREATS AND ATTACKS.

time-read
4 minutos  |
May 2021
ANATOMY OF AN OT ATTACK
Security Advisor Middle East

ANATOMY OF AN OT ATTACK

MAHER JADALLAH, SENIOR DIRECTOR - MIDDLE EAST & NORTH AFRICA AT TENABLE, DISCUSSES HOW, INSTEAD OF DEFENDING AGAINST AN ATTACK IN PROGRESS, A MORE SUSTAINABLE APPROACH WOULD BE ONE OF PREVENTION – OF ORGANISATIONS DOING A BETTER JOB OF UNDERSTANDING THEIR SYSTEMS, WHERE AND HOW THOSE SYSTEMS MAY BE EXPOSED, AND PRIORITISING THE THINGS THEY NEED TO PROTECT THESE SYSTEMS.

time-read
7 minutos  |
May 2021
MICRO FOCUS: OFFERING DRAMA-FREE IT WITH OPTIC
Security Advisor Middle East

MICRO FOCUS: OFFERING DRAMA-FREE IT WITH OPTIC

TOUFIC DERBASS, MANAGING DIRECTOR MICRO FOCUS MIDDLE EAST & AFRICA, DISCUSSES HOW THE LATEST IT PLATFORM FROM MICRO FOCUS OFFERS UNIFIED INTERFACE AND & EXPANDED INTEGRATION CAPABILITIES.

time-read
2 minutos  |
May 2021
COPING WITH THE NEW NORMAL
Security Advisor Middle East

COPING WITH THE NEW NORMAL

HUSNI HAMMOUD, MANAGING DIRECTOR - ESET ME, BARRACUDA NETWORKS, IVANTI (PART OF MIDIS GROUP), TELLS SECURITY ADVISOR HOW THE CHALLENGES OF THE LAST ONE YEAR HAVE CHANGED THE BUSINESS LANDSCAPE AND HOW ORGANISATIONS ARE NAVIGATING NEW TRENDS.

time-read
3 minutos  |
May 2021
AN IN-DEPTH DEFENCE STRATEGY
Security Advisor Middle East

AN IN-DEPTH DEFENCE STRATEGY

WERNO GEVERS, REGIONAL MANAGER, MIMECAST MIDDLE EAST, DISCUSSES HOW WHEN IT COMES TO EMAIL SECURITY, IT IS NECESSARY FOR SECURITY PROFESSIONALS TO EVOLVE FROM A PERIMETER-BASED DISCIPLINE TO A MORE PERVASIVE ONE.

time-read
4 minutos  |
May 2021