DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
The Latest "Software Integration: The Intersection of APIs, Microservices, and Cloud-Based Systems" Trend Report
Get the report
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Security Landscape Today

Security Landscape Today

Identify and enforce foundational security best practices.

Tom Smith user avatar by
Tom Smith
CORE ·
May. 01, 19 · Analysis
Like (3)
Save
Tweet
Share
4.93K Views

Join the DZone community and get the full member experience.

Join For Free

Great hearing what Derek Melber, Chief Technology Evangelist at ManageEngine, is seeing as he visits companies around the world. We are being breached. We see security fails everywhere. We all need to think about the fundamentals of security.

Security guidance over the years continues sharing the same best practices, the amount of money that's lost with each breach, and the number of records that are compromised. However, the guidance is worthless as the problem continues to grow.

Microsoft embeds PowerShell into every endpoint while hackers are able to use Mimikatz to exploit. The internet assists hackers to use PowerShell in an attack. All attacks begin and end with endpoints; as such, you need to secure all your endpoints.

Now there is a full suite of PowerShell “hacker” tools: PowerSploit, Invoke-Mimikatz, PowerView, and PowerUp. RSA 2016 had a presentation on Weaponizing PowerShell. It’s free and incredibly easy. Microsoft launches advances in scripting security and protection in Windows 10 and PowerShell V5. Then, a Windows flaw is exploited to deliver PowerShell backdoor (April 15, 2019). You need to secure PowerShell as well.

The cloud is nothing more than an extension of your on-prem environment. In August 2018, Microsoft blocked 1.29 billion authentications to Azure.

Image title

Are Our Security Efforts Bearing Fruit?

Spending on cybersecurity in the U.S. went from $27.4 billion in 2010 to $66 billion in 2018 — a 241% increase. While breaches went from 662 in 2010 to 1, 579 in 2017 — a 239% increase. While the number of records exposed exploded from 16.2 million in 2010 to 446.52 million in 2018 — a 2,756% increase. It appears the hackers' efforts are bearing a lot more fruit than our security efforts. 

7 Common Reasons Companies Get Hacked

Derek shared seven reasons why companies get hacked: 1) failure to check code before it’s deployed; 2) leaving source code exposed; 3) failure to change default passwords; 4) poor patching practices; 5) human error; 6) poor exfiltration control; 7) failure to recognize infiltration – Marriot took four years before they realized they were breached and they’re not alone.

Hackers always take the path of least resistance. If you wait a day to install a patch, trust that hackers will look for that opportunity.

Causes

Consumers and employees are the same in that free trumps security and free downloads are likely not secure. Then users share with others spreading the viruses. 75 to 80% of the top free apps were breached while 97% of top paid apps were breached. 70% of attacks now target office vulnerabilities because of the adoption of Office 365.

How Do We Address the Problem?

Secure passwords. Don’t rely on weak and stale Microsoft password policy options. Move to multi-factor authentication (MFA) where possible. Secure privileged access. Document and secure privileged groups. Maintain privileged group member lists. Secure endpoints. Reduce privilege for users on workstations and servers. Be notified when there's an anomaly. When a change occurs, get a notification. Track insider attacks. Use user behavior analytics. Secure environments from the ground up.

We’re being attacked at our foundation and we need to go back and identify and enforce foundational security best practices.

security Landscape (software)

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Cloud Performance Engineering
  • Choosing the Right Framework for Your Project
  • Configure Kubernetes Health Checks
  • Important Takeaways for PostgreSQL Indexes

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: