Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management

8/24/2017
03:50 PM
Simon Marshall
Simon Marshall
Simon Marshall
50%
50%

Government Insiders Are Security's Biggest Risk

Outside actors can be dangerous, but the biggest risk to organizations comes from within.

In the government security sector, you shouldn't need Forest Whitaker to tell you that the enemy is within. That's according to a survey that finds nearly three out of four worldwide government entities had their security breached last year. Every single entity that replied to the survey said they felt employees were the biggest threat to security, mostly through either human error or insider IT misuse.

Relax about old Cold War enemies, don't worry about potential Chinese sources of WannaCry and close your ears to threats from hackers threatening to leak the Game Of Thrones season finale. More, be anxious about how employee exposure to government data is occurring while government entities continue to prioritize security outside-the-perimeter over in-.

Survey author Netwrix, a firm that provides behavior-based analytics to predict risks from employee-based IT changes, claims there's a huge mis-determination that outside-in security risks are more worrisome than inside-out.

"Most security professionals think they know what to expect (from internal threats), but they don't really have the knowledge to handle them," Michael Fimin, CEO of Netwrix, told Security Now. "You can lock the door to your house but remain open to intrusions; you can sleep upstairs and not know what's going on downstairs."

There shouldn't be an "us" and "them," but government entities are struggling to understand how they can guard against insider actions -- consciously made or through mishap -- especially when BYOD presides. 75% of respondent entities reported they had no visibility into BYOD activity, nearly 70% were unaware of shadow IT, and about 60% knew nothing about the cloud infrastructure they were using. As a whole, the survey results can be viewed as highlighting a candid snapshot between the value of government data and the very insecure ways it is currently accessed, managed and maintained.

"We're moving from a time-honored, rules-based model to something else, because there's just too much data," said Fimin, "Now, it's all about machine learning, and that's something we have in our roadmap." With so many data sources, varying data quality and classification, and different user behaviors, gaining a predictive posture and consequent extra threat-reaction time through machine learning is the way.

This is a highly specific area within the data security family, but Fimin highlights Veronis and Titus as somewhat competitors because they overlap or part-complement Netwrix' solution areas. Veronis and Titus play within Data Classification – another area where data effectiveness and integrity is foremost. In fact, what they do can be seen as an integral part of the 'Effective Internal Data' mission; Netwrix focuses on users' (mis)behavior, and the other two examine better ways to classify/group data, so the resultant data analysis/time-to-react is optimized because there's extra context/insight included.

Clearly this sector is attracting funding. But Netwrix itself has not needed to go through the constant window dressing required for multiple funding rounds. Founded in 2007, it took what it classifies as a Series A round, but foresees no more.


Get real-world answers to virtualization challenges from industry leaders. Join us for the NFV & Carrier SDN event in Denver. Register now for this exclusive opportunity to learn from and network with industry experts -- communications service providers get in free!

"Round A was not necessarily driven by a need to raise money," said Fimin. "We don't anticipate further funding rounds because (Series A) was driven by a desire for greater board experience. Our board members have run larger companies before, which is an obvious advantage for us, and we are also able (from Series A) to grow-out our technology and the scalability of our sales operations. We have no need to participate in further rounds."

So, what's the market currently worth? IDC told SecurityNow that for the 2017 calendar year, it expects federal agencies to spend a total of US$3.7 billion, growing to $4.7 billion by the end of 2020. In percentage terms, the CAGR for cybersecurity for 2015 through 2020 is expected to be just over 8%. During 2017, IT security spending breaks out to roughly $1.8 billion for the Defense Department (DoD) and $1.9 billion for civilian agencies. By 2020, says IDC, that will grow to $2.5 billion for DoD and $2.2 billion for the agencies.

So, budget will grow -- but so will threats as a whole. IDC said that these mostly include ongoing threats to government systems, but also to consider are foreign attempts to tamper with political parties, elections, and federal agencies, threats to the nation's physical infrastructure (dams, bridges, water systems, and more), and monitoring network traffic to look for attempts to exploit weaknesses and to compromise data and systems government-wide.

Related posts:

Simon Marshall has worked within and around the telecom and IT industries for 21 years. Simon cut his teeth as editor-at-large at totaltelecom.com in the late Nineties, drove strategic communication and product marketing plans for Qualcomm, Neustar and Redknee during the Noughties, and lives today as a technical consultant, active tech news junky and content underwriter at Security Now.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.