![]() ![]() Using this data, the platform then builds models of the strengths and weaknesses for both the defender and attacker based on programmed constraints, and consequently reveals the attacker’s potential to breach a target and steal its prize based on those pre-trained risk conditions and the attacker’s capability. This is precisely what Digitalware is doing with its groundbreaking Epiphany Intelligence Platform.Įpiphany uses contextual data to analyze how offensive security people solve the perplexing riddle of attack vectors, and reveals where the attacker is likely to plant its foothold in our environment, the attacker’s ultimate target (server, etc.), the prize (sensitive data), and the prize value (ransom demands, etc.). ![]() Hannibal Lecter to gain insight on the psychology of cybercriminals.įortunately, we can leverage artificial intelligence and machine learning to understand the mindset and methodology of our security folks and the attacker, which is proving to render insight on both business and cyber risks. Forensic psychiatrists and scientists are traditionally the go-to experts for profiling criminals and reconstructing their crimes.īut in cybersecurity, we neither have the luxury of time to postmortemly reconstruct cybercrimes, nor are we privy to banter with the likes of Dr. Then we must break down the crime to understand its methods. To know the foe, we must understand its mind - what motivates it to act nefariously. We’ve got to leverage tools that enable us to quantify and understand the data and scale our security posture to beat evolving threats. We can no longer afford to blindly fight cyber foes. It’s time to cast light on the attack surface. If businesses can’t determine their risk profile - “Then it’s game over,” says Singer.Īs the cry for help echoes around the entire planet, we can expect to fork out $20 billion in ransom demands and $6 trillion annually for cybercrime damages by 2021. Threats are shooting into businesses from existing and new vulnerabilities, infinite attack vectors and surfaces, dynamically changing public cloud platforms, and other exploitable gateways.Īdversaries will strike businesses with ransomware every 11 seconds, and newly reported zero-day exploits will hit one per day by next year, according to Cybersecurity Ventures. The attack surface is too big for ill-equipped CISOs and security teams to conquer. Not only does this complicate the CISO’s duty to communicate business and cyber risks to key decision-makers in the organization, but it also puts security teams in a vulnerable stance as they blindly slug it out with adversaries in the trenches.ĭan Singer and Rob Bathurst usher in the idea of Risk Hunting “You’ve got all these tools and billions of dollars of sensors, and everything is telling you what is going on, but you don’t really know what you’re up against outside.” “It’s like piloting a submarine,” says Rob Bathurst, CTO at Digitalware. Imagine sifting through the estimated 111 billion lines of new software code every year, or hunting for risks in the 100 zettabytes of data predicted to live in the cloud by 2025. The dark truth is both CISOs and security practitioners are ill-equipped with despaired tools that produce overwhelming amounts of disaggregated data they must cross-reference and prioritize - making it nearly impossible to digest and render actionable intelligence. ![]() It is a gloomy forecast for CISOs and security folks. “Most CISOs can’t answer what their security risks are in the current threat landscape, how to reduce overall risks, and how to handle them.” “CISOs have an impossible job,” says Dan Singer, founder and CEO of Digitalware, Inc. Leveraging artificial intelligence and machine learning ![]()
0 Comments
Leave a Reply. |