Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

The Top 10 Cyberthreats Right Now

CRN asks technical leaders at Cisco, FireEye and LogPoint what the most pernicious cyberthreats are today and what organizations need to do to avoid becoming a victim.

Back 1 ... 8   9   10   11  
photo

Whitelisting

Whitelisting can be difficult for organizations to figure out how to deal with since a lot of third-party tools such as Dropbox or cloud infrastructure can be used for both benign and malicious purposes, according to FireEye's McNamara. As a result, McNamara said the company's Security Operations Center might see it as normal traffic and not sound the alarm.

If a cloud storage provider, webmail or social media application has been whitelisted and approved, McNamara said it's much harder to catch anomalous behavior coming out of it. As a result, McNamara said businesses must continually balance how much access they want to provide for third-party systems coming into their environment.

As usage of platforms and applications continues to increase, McNamara said it has become easier for threat actors to exploit the systems by blending into the noise. Adversaries will specifically focus their efforts on funneling malicious activity through the applications, tools and platforms that are seeing the most legitimate use and traffic within an organization, according to McNamara.

 
 
Back 1 ... 8   9   10   11  

sponsored resources