April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

January 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

When outsiders become insiders: Compromised credentials a threat to sensitive database content

San Diego, CA, November 16 - Far more cybersecurity focus should be redirected inward if modern enterprises want to seriously address today's most nefarious threats, according to the database security professionals at DB Networks. Specifically, enterprises need to understand the tremendous value of compromised credentials and that it's the stealing of those credentials that is the goal of most initial cyber attacks. Once credentials are compromised, an extremely large attack surface is opened up. Security analysts concur that insider threats are on the rise and the time is now to focus on these risks.

"There's a strong consensus within the cybersecurity industry that the insider threat is quickly becoming the most dangerous threat," said Brett Helm, Chairman and CEO of DB Networks. "Credentials are the keys to the digital kingdom, as many firms who have ended up on the wrong side of a cyberattack can attest. Unfortunately, security practices are typically behind the curve in this regard. What's needed now is a sea change shift in how enterprises think about the insider threat and compromised credentials specifically." 

Cybersecurity firm Mandiant has reported that 100% of its most recent incident responses have dealt with some form of insider threat. A Verizon study, meanwhile, revealed that 95% of security breaches involved harvesting credentials and then using those credentials to log into web applications to steal personal data. Even more troubling from the point of view of enterprises is that insider threats generally leave more damage in their wake, not to mention the tarnished public image when a company loses sensitive customer data to cyber thieves.

A common misconception about insider threats is they require a "rogue" employee or even simply a careless employee to download malware or click on a website that opens the network to outsiders. In fact, insider threats as a whole are far more complicated and varied, which makes planning for and responding to them a significant challenge. Outside attackers have numerous tools at their disposal to steal employee credentials. With those credentials in hand, the outsider essentially becomes an insider. While training programs must naturally be geared to making employees aware of such dangers, training alone can't mitigate the vast majority of insider threats.

Preventing insider threats against data center assets begins with a database assessment – an organization cannot protect assets of which it is unaware. The next step is to develop a clear picture of normal network activity behavior such that suspicious behavior can be identified. Intelligent monitoring can immediately detect unusual activity indicative of compromised credentials so that the situation can be mitigated before valuable data is compromised.

"Organizations seeking cutting-edge security must begin to turn their attention away from simply guarding the perimeter fences," concluded Helm. "At this point the most pernicious threats are already on the inside. Security staff must treat administrative credentials like the golden tickets they are, implementing systems that immediately identify compromised credentials."

About DB Networks®

DB Networks® innovates database cybersecurity products. Our customers include the world's largest financial institutions, healthcare providers, manufacturers and governments. DB Networks' unique approach to database security utilizes deep protocol analysis, machine learning, and behavioral analysis to automatically learn each application proper interactions and then applies those learning's to accurately and immediately identify attacks in the core network. With no signature files to deal with or endless false positives to chase down, operational support becomes trivial. DB Networks is a privately held company headquartered in San Diego, California. 

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...