Threat actors are leaning on new tools and techniques to improve the efficiency of their attacks. Only artificial intelligence (AI) and machine learning (ML) move quickly enough to defend organisations in this evolving cyber-threat landscape.
In the past three months we’ve been seeing more speed, and speed can kill. Threats have been getting into a system, hitting the targets, exfiltrating data, demanding a ransom and getting out of a system much quicker than normal. This includes attackers capitalising on new vulnerabilities such as zero-days and n-days. They also appear to have become more aggressive, with double extortion, triple extortion and targeted attacks. Their approaches are more tactical, and we’re still seeing more volume. All of that translates to more risk.
In 2022, wiper malware has been much more active than recent years, which ties into the theme of aggression. This is destructive malware that’s wiping out hard drives and master boot records of systems. We’re starting to see this tying into the world of extortion too. We’re not just talking about data at risk, but systems infrastructure at risk now.
By using machine learning and AI, you’re reducing risk dramatically. First, at the basic level you have automation. Automation is largely to help with the volume of detections and policies needed at speed, reducing reaction time and offloading mundane tasks from SOC analysts. Then, ML and AI come into place for the threats that are unknown. AI is the action piece, whereas ML is the learning piece. Machine learning works on models, and each application can use a different model. Machine learning for web threats is entirely different from machine learning for zero-day malware. Organisations need to be able to do them all to effectively secure against various attack vectors.
Segmenting networks is something we recommend as a very effective practical approach to reducing risk. If you segment it, it won’t be able to spread and hit other systems and create further downtime.
Building on top of that, zero-trust and ZTNA are a big topic nowadays. There are a lot of things happening on networks, devices coming in and out, applications coming on and off, etc. The idea that nothing should be trusted inherently can significantly increase security; instead it should be earned trust. In addition to that, breach and attack simulation, and having a plan ahead of time, is critical.
|Tel:||+27 11 543 5800|
|Articles:||More information and articles about Technews Publishing|
© Technews Publishing (Pty) Ltd. | All Rights Reserved.