Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
SPONSORED BY
9/13/2017
09:00 AM
Craig Dods
Craig Dods
Partner Perspectives
Connect Directly
Twitter
RSS
50%
50%

Detection, Prevention & the Single-Vendor Syndrome

Why security teams need to integrate 'Defense in Depth' principles into traditional solutions designed with integration and continuity in mind.

It’s a controversial statement, particularly when it comes from a security vendor, but it must be said: No single vendor can adequately protect your enterprise from all of today’s threats, let alone what might be on the horizon.

There is a misconception today that "complete prevention" is a realistic goal for an enterprise security program. As an adversary’s level of sophistication increases, the ability and efficacy of a single product at preventing arbitrary intrusions begins to decrease dramatically. As a result, security teams need to adopt a new mantra:  Given sufficient time, motivation, and funding, a sufficiently capable adversary will find their way into your organization, regardless of the tools that you have deployed.

One can simply recall the tale of djbdns and how its touted impenetrable "secure code" written by cryptographer Daniel J. Bernstein, failed to stand up to focused scrutiny. The story, as reported by The Register in 2009, is a cautionary tale about assumptions that organizations continue to make about the vulnerabilities of many devices and applications running on the typical enterprise network.

Knowing that the development of a perfectly secure application, system, or device is effectively impossible, we must shift our focus from "prevention” towards "rapid detection, coordination, and response." 

Regardless of market buzzwords, all vendors try to accomplish the same end goals by leveraging similar techniques and technologies. As discussed at this year’s BlackHat by Lidia Giuliano and Mike Spaulding (Lies, and Damn Lies), unsurprisingly, each vendor, based on their unique implementations,  have certain strengths and weaknesses, depending on the type of attack or technique being tested.

Consider the following scenario:

  • Product “A” may be able to detect attack “x”
  • Product “B” may be able to detect behavior "y"
  • Product "C" is unable to detect either "x" or "y," but is best positioned within the network to take the most effective action against the attacker
  • As is typical in the modern enterprise, Product A, B, and C are managed by separate teams and do not share the same reporting or communication structure.

This is a scenario to which many enterprises are now being exposed to, generally for the first time during post-breach incident response and forensics. Tools that they may have had in place detected portions of the attacker’s activity, but none were able to combine their results together to take effective action against the intruder in a timely fashion.

As a result, security teams are beginning to realize that due to the overwhelming volume and increasing sophistication of the modern threat landscape, they must now combine the proverbial "Defense in Depth" principle with solutions that are designed with integration and continuity in mind.  This means they need to prioritize partnering with companies whose cybersecurity offerings are open in nature and seamlessly augment security operations with automated detection, enforcement and remediation. Only in doing so can they maximize their chances of success against a motivated attacker.

Craig Dods is the Chief Architect for Security within Juniper Networks' Strategic Verticals. He currently maintains top-level industry certifications, holds multiple networking and security-related patents, and has disclosed multiple critical-level CVE's in a responsible ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15208
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
CVE-2020-15209
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
CVE-2020-15210
PUBLISHED: 2020-09-25
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
CVE-2020-15211
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
CVE-2020-15212
PUBLISHED: 2020-09-25
In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...