If you’ve heard the terms “lateral movement” or “golden tickets” recently, you might be wondering what they were referring to, and maybe not even realized they had anything to do with computer security. They are in fact references to the new breed of ‘Advanced Persistent Threats’ (APT) which have come to prominence as a result of some of the higher profile security breaches in the last 12 months. In fact, according to ISACA’s study “2015 Advanced Persistent Threat Awareness-Third Annual”, a full 74% of organizations think they will be hit by an APT in the near future. The risks of these types of exposure, and the fact that most organizations globally could be susceptible to such an attack, has led to a raft of new companies and solutions targeting this space. The big buzzword here is ‘Advanced Threat Analytics,’ and you’ll hear many vendors reference this in the context of ‘Big Data’ and ‘machine learning’ technologies. We’ve noticed that most solutions out there, while touting leading-edge characteristics, do nothing to help control or remediate these exposures, leaving customers at risk and often in the headlines. It’ll be interesting to note over the next four to six quarters which of the many emerging UBA vendors can deliver a solution that is both effective and practical.
Brad Bussie is an award winning fifteen year veteran of the information security industry. He holds an undergraduate degree in information systems security and an MBA in technology management. Brad possesses premier certifications from multiple vendors, including the CISSP from ISC2. He has a deep background architecting solutions for identity management, governance, recovery, migration, audit, and compliance. Brad has spoken at industry events around the globe and has helped commercial, federal, intelligence, and DoD customers solve complex security issues.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.
Read more© 2022 Stealthbits Technologies, Inc.
Leave a Reply