Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Disrupting Nation State Hackers With the Security Basics
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Disrupting Nation State Hackers With the Security Basics
ITSecurity

Disrupting Nation State Hackers With the Security Basics

thu@duosecurity.com
thu@duosecurity.com
5 Min Read
SHARE

Contents
  • Why It’s So Hard to Secure Everything
  • How to Secure All The Things
  • Defend Against Lateral Movement

Earlier this year at the USENIX Enigma information security conference held in San Francisco, NSA’s Rob Joyce gave a talk, Disrupting Nation State Hackers on how to keep people like him (nation state and other types of hackers) out of their systems.

More Read

Image
CAPEX Deferred Eventually Makes the Company Sick
Less Wrong: Using Predictive Analytics to Improve Budgeting
ROI Still Elusive for Cloud Situations: Analyst
Today’s Biggest Cyber Security Threat is Inside Your Business
Security and Data Visualization- Use the NCTC WITS system

Earlier this year at the USENIX Enigma information security conference held in San Francisco, NSA’s Rob Joyce gave a talk, Disrupting Nation State Hackers on how to keep people like him (nation state and other types of hackers) out of their systems.

Rob has been with the NSA for 25 years, and now works as head of their Tailored Access Operations (TAO) taskforce that hacks into systems of foreign adversaries, as Wired reported in January.

Why It’s So Hard to Secure Everything

Network boundaries are becoming more amorphous and blurred, due to:

  • Bring Your Own Device (BYOD) – Personal devices, including mobile phones, tablets and other devices are being trusted on your network
  • Cloud computing – By putting your data in the cloud, you’re putting trust in your cloud provider’s security protocols – but it’s still part of your risk and liability
  • Internet of Things (IoT) – Many elements of your building infrastructure (such as heating/cooling systems) are now part of your network and liability
  • Work from … anywhere – Logging in from different, possibly unsecured networks can put transmitted and accessed data at risk, especially if done with outdated devices

How to Secure All The Things

There are things organizations can do to protect against known vulnerabilities, malware and other ways attackers try to get in:

Upgrades and automatic patching – If there’s a known bug in software that’s exploitable, you should fix that and get it off your network.

Automatic patching that is beyond user control is ideal for security, as it cuts down on the hacker’s opportunity window between a vulnerability becoming public and actual execution.

Known vulnerabilities are used more often than zero-days, and are effective only because organizations don’t update as often as they should.

Implement application whitelisting – Establish a list of applications that have been granted permission to execute on your machines – when an app attempts to execute, it’ll be checked against the list before allowing it to run.

The concept of trusted devices and networks works in a similar way. Make a list of devices and networks that you allow to access your applications, and block any anonymous networks or certain locations based on a list of IP addresses.

Credential security – Rob notes that in almost any intrusion during the initial exploitation phase of hacking, attackers try to get credentials to gain legitimate access.

Monitoring and setting a baseline for normal user behavior can help you recognize when a user is acting differently once logged in with legit credentials.

Ensure you use the least privilege principle for your users’ accounts, and only allow a small number of accounts to have the keys to the kingdom.

And more authentication security – Eliminate the reuse of administrator credentials to servers, which can lead to wide-scale compromises.

Eliminate the use of hardcoded admin or other system-wide credentials, and ensure they’re not accessible on any devices.

Ensure all authentication is only done with modern protocols, keeping passwords out of plaintext. While most modern protocols don’t pass plaintext credentials, older ones do – and nation-state hackers do take advantage of the ones that are

Two-factor authentication – The use of two-factor technology makes it harder to steal credentials. It’s important to ensure that lost credentials doesn’t get turned into a pivot at a later stage, allowing for greater access

Defend Against Lateral Movement

Most networks have a hard outer shell, but soft gooey center. Here’s how you can harden it:

Network segmentation – Identify what you need to protect, segment and manage the trust to the most important places to make it difficult for hackers to access. Consider who really needs access, and again, employ least privilege.

Two-factor authentication – Again, use it everywhere to stop hackers from moving around inside your network. Attackers will leverage multiple stolen credentials or reused passwords to get closer to their target data.

Disable software you’re not using – While not new advice, this can greatly reduce the attack surface.

Watch the video for Rob Joyce’s full talk.

TAGGED:data securityhackers
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

composable analytics
How Composable Analytics Unlocks Modular Agility for Data Teams
Analytics Big Data Exclusive
fintech startups
Why Fintech Start-Ups Struggle To Secure The Funding They Need
Infographic News
edge networks in manufacturing
Edge Infrastructure Strategies for Data-Driven Manufacturers
Big Data Exclusive
data mining to find the right poly bag makers
Using Data Analytics to Choose the Best Poly Mailer Bags
Analytics Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

Don’t Rely on Luck: Why Small Businesses Need Disaster Recovery Plans

4 Min Read
saas and data security
SaaS

The Advantages of SaaS for Data Security Strategies

8 Min Read
Big Data Generation
Big DataPrivacy

Big Data Generation: What Will the Future Look Like for Millennials?

6 Min Read
data protection big data
Best PracticesBig DataData ManagementITPrivacyRisk ManagementSecurity

The Importance of Data Protection During the Coronavirus Pandemic

6 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?