Hackers Can Change Their Attack Methodology In A Day

I then asked the vendor to take us step-by-step of how they were going to detect APT using the details of what the APT last did to the customer. I wanted to know how the APT was detected, since they used a zero-day exploit to capture a local admin password that they then used to act as the legitimate user across the network, doing things that the legitimate user could do. I asked them how their product was going to tell the difference between the legitimate user doing their usual job and APT using that same user’s credentials to do the same thing. Granted, there are many ways to do this, depending on how the product works, but in this case, the appliance being touted didn’t have those sorts of capabilities. You could have heard a pin drop in the room. The vendor was silent for an uncomfortably long time, before saying that they would need to do some research and get back to us, which they never did. I saved that customer millions of dollars that day. If more vendors were held accountable for their promises, there would be less worthless junk out there.

Slower Budgeting Cycles

IT budgets are set in a minimum of 1-year cycles, and big projects often take multiple years to get reviewed and approved. Hackers can change their attack methodology in a day. Because defenders are always reacting to threats, the inherent nature of slower budgeting cycles means IT can rarely meet a new emerging threat head on as it occurs. It often takes companies a year or longer to respond to an emerging serious threat.

Popular posts from this blog

WELL YOURE ABOUT TO FIND OUT

THIS IS ONE OF THE NEATEST THINGS ABOUT ARRAYS

Note Mac users see the end of this book