Mecklenburg-Vorpommern District

Threat landscape 2020: see what escaped the perimeter

[ad_1]

The reality of today is that security breaches are a given. Demanding attackers are too numerous and too determined to be caught by perimeter defense. It is relatively easy to exploit vulnerabilities at the edge of the network or to trick a user into granting access to their device. From there, attackers can lie in wait for days, weeks, or months until the time is right to spread to other more critical systems, deliver a malicious payload, and achieve their goal – whatever that may be. It doesn’t matter whether an attack is successful, but when. Organizations are better served with a security team that shifts their focus from preventing all attacks (which is next to impossible) to stopping attacks from spreading once they’ve committed that first security breach.
The data prove this.

The following report from the VMware Threat Analysis Unit is a summary of key data and results from July 2020 through December 2020. It highlights threats that evaded perimeter defenses and were identified by VMware sensors within the perimeter.

The results are clear: Despite the deployment of a perimeter protection cadre, malicious actors are actively operating in the network. Research shows a clear picture of how attackers bypass perimeter detection, infect systems, and then attempt to spread sideways across the network to achieve their target. Armed with this knowledge, Chief Information Security Officers (CISOs) and network security teams can gain critical insights into how to combat these threats, stop them from spreading, and prevent them from actually causing damage once they are on the network.

[ad_2]