SecurityIntelligence blog: Tracking Online Fraud: Check Your Mileage Against Endpoint Data

A recent Simility blog post detailed how it is tracking online fraud. With the help of a SaaS-based machine learning tool, the company and its beta customers have seen a 50 to 300 percent reduction in fraudulent online transactions. This last January, they looked at 100 different behaviors across 500,000 endpoints scattered around the world. They found more than 10,000 of those devices were compromised, and then looked for patterns of similar behavior. They found seven commonalities, and some of them are surprising.

You can read my blog post on IBM’s SecurityIntelligence.com here.

iBoss blog: New Windows 10 Anniversary Security Features are Worth the Upgrade

This month the updated Windows 10 Anniversary Edition is now available for download. (Here is a list of offers on Microsoft’s blog.) There are several new security features worth mentioning, including Information Protection andDefender ATP (each of which will require a Windows 10 Enterprise E3 or E5 subscription respectively). I cover what these new features are and suggest that if you are using an earlier version, it might be time to upgrade on my iBoss blog post today.

SecurityIntelligence.com: Protecting Your Network Through Understanding DNS Requests

Most of us know how the Domain Name System (DNS) is a critical piece of our network infrastructure and have at least one tool to keep DNS requests current and clear of potential abuses. Sometimes a little common sense and knowledge of your system log files and the DNS requests contained therein can go a long way toward understanding when your enterprise network infrastructure has been breached. I note a tale from the Cisco Talos blog how they just used some common sense research in my latest blog post for SecurityIntelligence.com today.

iBoss blog: The benefits and risks of moving to BYOD

In this, the first of a two part series, I talk about why you want a BYOD program at your company.

We all know that mobile devices are becoming more popular and more used for enterprise computing needs. It is no mystery, especially now that phone screens approach the dimensions of small tablets, that both iOS and Android operating systems are becoming more capable of handling all sorts of corporate apps.

You can read my post on iBoss’ blog here.

SecurityIntelligence: The Rise of the Selfie Authentication as a New Security Factor

The idea is a good one: Use the cellphone camera to take a selfie and employ it as another login authentication credential. Both MasterCard and LogMeOnce have introduced a type of selfie authentication. I talk about ways that they differ and how they can add an extra layer of security in my latest article for IBM’s SecurityIntelligence blog here.

Better cybersecurity training through gaming

I came across a report entitled Video Games as a Training Tool to Prepare the Next Generation of Cyber Warriors by the Software Engineering Institute. While out for a year, it still worth reading. The authors are part of a project at Carnegie Mellon University and suggest that the coming cybersecurity skills gap will be critical and require some non-traditional methods to fix. Their thesis is that we have to turn to video games to heighten some new interest, and to start with young children. By grabbing kids’ attention and building a solid foundation of skills and infosec knowledge, the games could help motivate a passion towards finding a career cybersecurity later in life.

One of the reasons why games make sense for cybersecurity is that they are designed for multiple players; promote team building and scenario-based problem solving. All of these are very valuable when it comes to responding to digital attacks and other IT-related situations.

Plus, under the category of unintended consequences, getting kids involved in security-related games could help narrow the gender gap as well: nearly half of gamers are girls, who have been historically under-represented in the cybersecurity field. And with more than 175 million gamers in just the US alone, there is a wide pool of potential recruits.

The idea isn’t new: the sci-fi series “Ender’s Game” by Orson Scott Card and the movie “The Last Starfighter” both have had a similar plot line — and both are from decades ago. In the real world, the modification of the game Doom by the US Marines has been out for decades as well. When it was first developed in the early 1990s, it cost about $25,000 and took about six months to develop. It proved to be so popular with the soldiers that they would queue up in the evenings to get a chance to play. Since then, the US Army released its own game, called America’s Army, that was designed as a recruitment and public relations tool but migrated into helping new enlistees learn about the state of weaponry and tactics that they would be learning in basic training exercises.

But what is new is that there are a number of video games, include one from a CMU-affiliate, that can help bridge the gap. The report reviews several of them. These include games for children, such as MySecureCyberspace and CyberCiege; Control-Alt-Hack, a card game targeted at teens; Cyber Awareness Challenge and Cyber Protect, two games created by the DoD several years ago; and Watchdogs, a game for various consoles that has been out since 2014. Some of these games get pretty deep into things such as understanding appropriate IT policies such as setting strong passwords and implementing biometric access to sensitive data. Think about that for a moment: when was the last time you could learn about setting a firewall rule with a tactic in some first-person shooter game? Card’s Ender was ahead of his time.

Sadly, none of these games is really optimally suited for the proposed task of training cybersecurity defenders. It is a fair assessment, since none of them really had that as an original design goal. The authors state that it is “time to invest in a cybersecurity training video game that can be used to prepare the next generation of cyber-warriors and infosec professionals.” The report is well worth reading.

Veracode blog: Why firewalls aren’t your only friend

Firewalls have been protecting networks for decades, and many of us can’t remember life before them. But they aren’t your only friends, and these days just having a firewall isn’t enough to keep the bad guys from penetrating your network. While they are a good first step, you need to start thinking beyond firewalls to keep your infrastructure secure.

What is really required is to move away from the notion of “we need to build a wall” to “we need to understand what is going on across our network.” It is a very different mindset, and requires an IT department to think differently about how to implement their network security and operations.

The first step is in understanding what is going on across your application layers. To do this properly, you need to discover what applications are running across your enterprise. Some of the more modern firewalls are attempting to collect this information; they often rely on the IT department to understand their app portfolios up front to be effective. For example, they offer very granular app-level control, such as the ability to block a Facebook wall post but allow users to read their Facebook accounts. Many products (such as Palo Alto Networks) have extensive applications databases that they can draw on to model particular behaviors so that network administrators can craft very fine-grained access policies.

But most firewalls are too steeped in the ports and protocols approach to be truly effective, and many require that IT operations keep up with network documentation and have a deep knowledge about the interaction of their firewall rule sets. Tools like Veracode that specialize in the app-layer defense don’t assume this knowledge, and also make it easier to set up app-specific security policies.

Once you have this understanding, you can better design your app-layer network protection. Firewalls were designed to handle network-events, such as finding and blocking botnets and remote access exploits. Why can’t firewalls handle app-level situations? Well, some can, but only with some significant effort at configuring and monitoring them. Specialized app-layer tools are better at finding vulnerabilities and inspecting traffic that is moving across the application layers. You especially want app-layer protection if you have web-based or cloud-based applications.

Next, you need to think differently about your endpoint protection too.

We all know that the days of simple endpoint protection are over. Scanning and screening for malware has become a very complex process, and most traditional anti-malware tools only find a small fraction of the potential infections that are available to today’s cyber-criminals and attackers. Today there are numerous specialized endpoint detection and response (EDR) products that can dive deeper and understand the progress of any infection that happens. The best products are both hunting down particular exploits as well as gathering information about what is happening and tie into existing security news feeds as well. Many offer real-time analysis and other insights.

When you start looking at your endpoints holistically in this fashion, you will find there are plenty of endpoints that aren’t traditional end-user devices. Most modern networks have plenty of embedded devices that are connected to their networks, such as network-based printers and cameras, environmental monitoring devices, and specialized industrial equipment. Remember the Target HVAC exploit? That was just the tip of numerous such attacks.

Even if these systems aren’t connected to the network directly, they do have the means to be infected by a network-based computer, as the Iranian nuclear plant at Natanz found out years ago with the Stuxnet virus. Again, this is an area where traditional firewalls fall down: a potential threat from a print server could be buried in a firewall log. There are better ways to avoid this issue, such as by changing the default management ports and authentication credentials, keeping up with firmware updates, putting all embedded devices on their own VLAN and clearing their buffers and histories often.

Part of the tools for these EDR products includes being able to block insider threats. These threats are becoming more common, and one of the reasons why traditional firewall and anti-virus protection has failed is because attackers can gain access to your internal network and do damage from a formerly trusted endpoint. Many firewall administrators are used to blocking incoming traffic and have focused their attention in the past to this arena. But traffic that originates from an insider who has been compromised is a problem too. To block this kind of behavior, today’s tools need to map the internal or lateral network movements so you can track down what PCs were compromised and neutralize them before your entire network falls into the wrong hands.

As you can see, building up walls are a good first approach but not the only mechanism for defining your network, your applications, and your endpoints. You need a combination of several protective devices that can work together to secure your enterprise and gain visibility into all of your vulnerable places.

iBoss blog: There’s No Single Magic Bullet for IoT Protection

An earlier post of mine for iBoss addressed the issue of wearable fitness devices and smartwatches and their network threat. And while that post has lots of suggestions on how you can protect your network, there is still a lot going on with the IoT world.

In this post for iBoss, I discuss recent exploits using an all-webcam botnet, how the NSA wants to use IoT devices to profile your communications, and how enterprises are using mobile device management tools.

Subscribe now to Inside Security

You may be surprised that the overall rate of malware infections is at its lowest point in three years, at least according to one source (Engima Software) that measures these things through its own network of sensors deployed across the globe. Yet this average obscures a lot of other trends, such as that the rate here in St. Louis has actually not dropped all that much, putting my fair city at the number two spot for the most infected places to compute (Tampa is #1).

This is just one of the many news nuggets that you will get if you subscribe to my twice-weekly Inside Security email newsletter, a separate effort from Web Informant that is being done through the auspices of Inside.com. The company has started several other newsletters, including one on Teslas and one on virtual reality.

Also this week, two new forms of Mac-based malware have been discovered, one called Pirrit and one called Eleanor-A. For years the Mac has been a relative safe haven, especially when compared to Windows. But with the rise in its popularity comes a more tempting target for malware writers. The former one is a piece of adware that actually acts like an infection, while the latter comes as part of a fake document conversion tool called EasyDoc that is just a container for a collection of remote access Trojans that persist even after you try to delete the application.

Speaking of Safe Harbor, and by that I mean the EU’s prior privacy regulations that were struck down some time ago, there is now a replacement called Privacy Shield. I link to the new regulations, along with some insightful commentary at Ars Technica (for the non-lawyers) and at SociallyAwareBlog (for those that want more or who are lawyers themselves).

Finally, do you want to examine the code that ran the Apollo spacecraft guidance computers? Now, thanks to some diligent volunteers, you can on Github, provided you know how to read Assembler. The code contains copious nerd humor and 60s-era POV, along with modern day space enthusiast insider comments too. Houston, we have a program!

There is a lot more on my newsletter this week, including links to how to learn to become a CISO and other noteworthy security reports, so subscribe here now.

 

iBoss blog: Beware of wearables!

As more of our users start literally wearing their own gear to work, the number of threats from these devices, such as Fitbits and Apple Watches, increases. After all, they are just another remote wireless computer that can be compromised to gain access to your enterprise network. I talk about the potential threats and ways to mitigate them, along with other factors. You can read my post here on iBoss’ blog.