Coviello: Modern Security Threats are Less About the Techniques

  /     /     /  
Publicated : 22/11/2024   Category : security


Coviello: Modern Security Threats are Less About the Techniques


Todays attack surface is broader, more open, and demands a proactive approach to security, according to former RSA chairman Art Coviello.



As the threat landscape changes, so too do demands on cybersecurity leaders and their teams. Art Coviello, executive chairman (ret.) of RSA, says todays defenders should be more concerned about vulnerabilities in the attack surface than on threat actors specific techniques.
What people dont get about the threat landscape is, its less about the techniques and more about the attack surface, and the number of openings that have been created, Coviello said in an interview with Dark Reading during last weeks RSA Conference in San Francisco.
He explained how security concerns have shifted since the time of the dot-com crash, when there were maybe 20- to 30 computer viruses. Now, there are hundreds of millions, he pointed out. The tipping point came in 2007, a watershed year in which mainstream applications went online and the iPhone launch kickstarted the age of mobility.
From that point, the attack surfaced continued to expand and has ever since, he said. Now were at a point when employees are going straight from their devices to the cloud. The priority is no longer solely attack prevention, said Coviello, who serves on the Board of Directors at EnerNOC, AtHoc, and Tenable. Its about a resilient, holistic approach, he said.
One of the places where organizations leave themselves vulnerable is Web applications. With the onset of agile development, Web apps are no longer a curiosity, he said. Theyre expected. The waterfall method, in which apps were delivered annually or every six months, has been replaced with agile methodology. Now, developers are creating and updating apps in real-time.
Todays dev teams are under increasing pressure to make applications safe from the start. If you dont build secure code in the first place, youre in big trouble in an age of agile development, said Coviello. If they dont get it right, security teams face the consequences.
With a larger attack surface, companies also have to do a better job of incident detection, response, and recovery. As security operation centers (SOCs) have become overwhelmed with alerts from their growing collection of
intelligence systems
, prevention is again top of mind. If they have enough information, security teams can spot when attackers are taking action.
The best place to stop an attack is before it starts, Coviello noted.
The influx of threat intelligence tools has driven a change in mindset from reactive to proactive security. Previously, all of the tools were siloed, he explained. They only did one specific things; they didnt add any value to each other. Reactive security meant plugging in the holes between tools that left information and assets exposed.
Todays intelligence-driven security model makes it easier to identify and prioritize critical assets, applications, and infrastructure. Security controls need to add value to one another; for example, data loss prevention tools can help pinpoint critical assets. We cant defend everything, said Coviello. We have to understand whats most important. This means determining where valuable data lies and how an attacker might try to get it from the outside.
Proactive security may be the way to go, but many businesses have struggled to adopt it. Theres a critical shortage of people to implement that model, said Coviello, pointing to a key trend heard throughout the RSA Conference. The cost of acquiring talent is skyrocketing.
Its also tough to convince business leaders to adopt new technologies when they dont understand the threats and risk. Most senior management employees dont understand technology, he explained, and neither do executive boards.
Finally, there is a need for more advanced technology to defend the rapidly expanding attack surface. The attack surface has been growing faster than the industry has been able to develop the tools, Coviello noted.
Related Content:
Cybersecurity Buzz Phrase Bingo
Threat Intel: Finding Balance in an Overcrowded Market
Microsoft CISO Talks Threat Intel, Data Inclusion
Firms More Likely to Tempt Security Pros With Big Salaries than Invest in Training
Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda 
here
. Register with Promo Code DR200 and save $200.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Coviello: Modern Security Threats are Less About the Techniques