Stop betting on detection-based security technology


Today’s columnist, Aviv Grafi of Votiro, says companies need stronger, more proactive tools, and must give CISOs a seat at the table –or else we’ll have more major attacks like the ones on SolarWinds, Microsoft Exchange, Colonial Pipeline, and now Kaseya. ecooper99 CreativeCommons CC BY 2.0

A clear majority – some 68% of global CISOs – do not believe that their organization can cope with a cyberattack. As a result, CISOs are continuously approaching enterprise leadership and company board members to voice their concerns. So, it would make sense that top managers would give CISOs the resources they need to do everything possible to prevent an attack. Guess what? They’re not.

Organizations are not being proactive in their security strategies and are failing to implement the proper security controls. Immediately after an attack occurs there’s a groundswell of concern and discussions circle around how the attack occurred, who was responsible, and the damage incurred. This conversation turns the focus to remediation and away from what’s most important: How can we ensure that these types of incidents do not occur in the first place?

Most recently, we’ve witnessed some of the most massive—and impactful—security incidents such as SolarWinds, Microsoft Exchange Server, Colonial Pipeline, and now Kaseya. These attacks grab the attention of all the major television networks and make front page headlines. Yet, they fail to grab the attention of board members, top executives, and constituents of publicly-traded companies so that they spur the hands-on tech people at the company level to take action. Have we not had enough close calls or downright direct hits? Enough is enough. It’s time for decision-makers to step up, take action and implement preventative measures to defend against these attacks once and for all.

Detection-based solutions have serious security gaps

These threats almost always enter the networks through malware-bearing files, such as email attachments or website downloads. The malware gets planted via a payload and triggered by an unsuspecting target. It should come as no surprise that 41% of CISOs fear…

Source…