{"id":2277,"date":"2013-05-02T00:00:00","date_gmt":"2013-05-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/02\/cyber-responders-seek-new-ways-to-respond-to-cyberattacks\/"},"modified":"2021-12-30T11:40:59","modified_gmt":"2021-12-30T11:40:59","slug":"cyber-responders-seek-new-ways-to-respond-to-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/02\/cyber-responders-seek-new-ways-to-respond-to-cyberattacks\/","title":{"rendered":"Cyber-Responders Seek New Ways to Respond to Cyberattacks"},"content":{"rendered":"<p>Last year the South Carolina Department of Revenue found that a hacker had used a \u201cspear-phishing\u201d attack to install at least 33 unique pieces of malicious software and utilities on the department\u2019s servers to steal financial data. In another headline-grabbing security breach a year ago, hackers from Eastern Europe stole the Social Security numbers of as many as 280,000 people from Utah Department of Health databases, an incident that quickly forced state CIO Steve Fletcher\u2019s resignation. The Alexandria, Va.-based company is one of a new generation of network threat detection and response companies that have sprung up over the last few years to complement traditional anti-virus and data loss prevention approaches that \u2014 although still necessary \u2014 are inadequate to cope with new types of targeted attacks.&nbsp;&nbsp;&nbsp;Indeed, a post-breach investigation of Chinese hackers\u2019 cyberattack last year on The New York Times\u2019 computer systems uncovered that anti-virus software found only one of the 45 different pieces of malware planted on The Times\u2019 systems during a three-month period.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Local and state government offices that may not see themselves as prime targets for theft of intellectual property or financial information can be used as the weak link to get at financial institutions, Ling said.<\/p>\n<p style=\"margin: 0px;\">The business models of large anti-virus vendors such as Symantec and McAfee incorporate everyone who has a computer, because perimeter defense is an important aspect of protection and is mandated by many federal regulations, including the Health Insurance Portability and Accountability Act (HIPAA).<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">As with other vendors, FireEye\u2019s starting point is that malware threats evolve so quickly that the traditional protection model is antiquated, explained Phillip Lin, director of product marketing.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cWhen we were working for McAfee, we investigated large breaches such as Aurora,\u201d recalled Dmitri Alperovitch, a CrowdStrike co-founder and former vice president of threat research at McAfee.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Based in Orange County, Calif., CrowdStrike was founded in 2011 by George Kurtz, the former worldwide CTO of McAfee; Alperovitch; and Gregg Marston, who worked as chief financial officer of Foundstone Inc., a cybersecurity forensics firm that Kurtz sold to McAfee.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Mike Maxwell, director of Symantec\u2019s state and local government organization, said anti-virus continues to be an important tool for containing and blocking malware, but other approaches are necessary to complement it. This makes it difficult for traditional \u2018signature-only\u2019 anti-virus approaches to keep up with these evolving threats,\u201d he explained in an email response to questions from Government Technology. But it also builds a list of bad stuff such as the application is communicating with a known bad IP address or it is attempting to insert files in other common load points, such as the registry, removable storage or file system, so this may be suspicious activity that would be blocked, logged or alerted based on configured policy.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Yet Howard said he has seen real change during the past few years: More organizations are moving away from denying that they are under attack; instead they are trying to figure out how they can limit the damage.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Booz Allen Hamilton\u2019s Ling said that although these new companies may be good at what they do, it\u2019s difficult to create a business model around any one aspect of protection, and a chief information security officer may not want to create a mix-and-match solution, because then the risk is assumed by the decision-maker, not the solution provider.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.govtech.com\/security\/Cyber-Responders-Seek-New-Ways-to-Respond-to-Cyberattacks.html\">http:\/\/www.govtech.com\/security\/Cyber-Responders-Seek-New-Ways-to-Respond-to-Cyberattacks.html<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2277","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2277"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2277\/revisions"}],"predecessor-version":[{"id":4764,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2277\/revisions\/4764"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}