Search
This page's url is: -Closeup CRN- Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs Dell EMC Newsroom Hitachi Vantara Newsroom IBM PartnerWorld Newsroom HPE Zone Tech Provider Zone

The Top 10 Cyberthreats Right Now

CRN asks technical leaders at Cisco, FireEye and LogPoint what the most pernicious cyberthreats are today and what organizations need to do to avoid becoming a victim.

Back 1 ... 8   9   10   11  
photo

Whitelisting

Whitelisting can be difficult for organizations to figure out how to deal with since a lot of third-party tools such as Dropbox or cloud infrastructure can be used for both benign and malicious purposes, according to FireEye's McNamara. As a result, McNamara said the company's Security Operations Center might see it as normal traffic and not sound the alarm.

If a cloud storage provider, webmail or social media application has been whitelisted and approved, McNamara said it's much harder to catch anomalous behavior coming out of it. As a result, McNamara said businesses must continually balance how much access they want to provide for third-party systems coming into their environment.

As usage of platforms and applications continues to increase, McNamara said it has become easier for threat actors to exploit the systems by blending into the noise. Adversaries will specifically focus their efforts on funneling malicious activity through the applications, tools and platforms that are seeing the most legitimate use and traffic within an organization, according to McNamara.

 
 
Back 1 ... 8   9   10   11  

sponsored resources