Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud Security

3/1/2018
09:35 AM
Simon Marshall
Simon Marshall
Simon Marshall
50%
50%

Cisco Security Report Finds Cloud-Based Attacks Increasing

While enterprises are moving to the cloud to help cut costs and better secure data, attackers are also taking advantage of this shift to newer technologies and platforms.

Security attacks launched from the cloud, and especially those using encrypted malware, are proving a mounting challenge for defenders who are also faced with increasingly costly attack volumes and vectors.

The effects of such attacks cause disruption resulting in lost revenue and customers, missed opportunities and expensive clean-up bills.

Cisco's recently released the results of its 2018 Annual Cybersecurity Report, based on data collected in 2017, where 3,600 security professionals in 26 countries were asked what their biggest headaches were. More than half of attacks acknowledged by respondents resulted in a total cost of half a million dollars per company.

Not that these costs could have been mitigated. CISOs and their InfoSec teams are under increasing pressure to show corporate boards and CEOs, who are worried about potential legal actions or future financial losses, that their enterprise networks are secure.

A lack of advanced security in the cloud -- at the same time more and more enterprises are investing in cloud service -- may leave CISOs ambivalent about where their corporate data can safely live. Cisco found that attackers are taking advantage of evolving and expanding cloud environments as a foundation for attacks, but conversely, private clouds are being utilized by about a quarter of firms, up from 20% in 2016.

Among these, about 60% of enterprises and their security teams report that they host networks in the cloud because they feel it offers better security. About 50% note that they do so because of either better scalability or ease of use.

Corporate weaknesses
A wide range of potential weak points for attack were reported, including the third-party supply chain, the constant evolution of malware, and the fact that encryption is increasingly used by hackers to avoid detection.

"Last years' evolution of malware demonstrates that our adversaries continue to learn," said John Stewart, senior vice president and chief security and trust officer at Cisco. "We have to raise the bar now."

The report highlights that supply chain attacks are increasing in velocity and complexity, focusing the minds of CISOs on how watertight partner cybersecurity hardware and software is, citing Nyetya and Ccleaner as attacks on trusted software.

"We believe that we'll see more of these types of attacks in 2018," Franc Artes, architect of Cisco's security business group, told SecurityNow. "(We feel) that no sector is safe from attacks. Most adversaries are opportunistic and will not discriminate across countries or verticals."

Encryption poses a special challenge to defenders in that it both secures against attacks while providing a vehicle for them.

"Attackers are aware that in-line security technologies have the capability to intercept and inspect encrypted traffic; they are also aware many companies do not enable this functionality," said Artes.

In terms of lines of defense, a quarter of security professionals surveyed in the report said they used technology from between 10 and 20 vendors, illustrating how fragmented the approach to cybersecurity can be as threats grow in volume and complexity.

More companies are using AI and machine learning to level the playing field. In particular, behavioral analytics were used by nearly all respondents to help locate bad actors in networks. But machine learning still has a way to go to improve the rate at which it "learns" security threat patterns.

"We believe that though better training, data can help speed machine learning," said Artes. "Its real value, especially in monitoring encrypted web traffic, stems from its ability to detect 'known-unknown' threats -- previously unseen variations of known threats, malware subfamilies, or related new threats -- and 'unknown-unknown' net-new malware."

Related posts:

— Simon Marshall, Technology Journalist, special to Security Now

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.