Intelligent CIO Middle East Issue 29 | Page 59

////////////////////////////////////////////////////////////////////////// encrypted web traffic it’s harder than ever to identify and monitor potential threats. According to Cisco, more than half of all cyberattacks have resulted in financial damages of more than US$500,000 with attacks on supply chains increasingly common and harmful. The report issues the warning that such attacks can persist for several months or even years. It states: “Defenders should be aware of the potential risk of using software or hardware from organisations that do not appear to have a THERE IS NOT A DAY THAT GOES BY WITHOUT US HEARING ABOUT THE LATEST THREAT THAT COULD LEAD TO A SIGNIFICANT LOSS OF DATA ALONG WITH REPUTATIONAL DAMAGE. putting their trust in behavioural analytics to locate malicious actors on the networks. According to Cisco, 92% of security professionals said behaviour analytics tools work well. Two-thirds of the healthcare sector, followed by financial services, found behaviour analytics to work extremely well to identify malicious actors. Another notable change is the growth of cloud with attackers taking advantage of a lack of security. The report finds that while the cloud offers better data security, the downside is that attackers are taking advantage of the fact that security teams are having difficulty defending evolving and quickly expanding cloud environments. The true cost of cybercrime A global cybersecurity report has revealed that cybercrime takes a near US$600 billion toll on the global economy. McAfee, in partnership with the Center for Strategic and International Studies (CSIS), has released the Economic Impact of Cybercrime – No Slowing Down report. This concludes that cybercrime now costs businesses close to US$600 billion a year. To put this in context, this is up from global losses of US$445 billion in 2014. responsible security posture.” Worryingly, two of the major attacks last year (Nyetya and Ccleaner) infected users by attacking trusted software. The threat landscape is changing all the time One of the other major changes is that security professionals are increasingly www.intelligentcio.com FEATURE: MAGAZINE LAUNCH The report attributes the growth over three years to cybercriminals quickly adopting new technologies, the ease of engaging in cybercrime (including an expanding number of cybercrime centres) and the growing financial sophistication of top-tier cybercriminals. The report finds that banks remain the favourite target of cybercriminals and claims nation states are the most dangerous source of cybercrime, with Russia, North Korea and Iran the most active in hacking financial institutions. New technology brings awareness of unknown threats The latest cybersecurity technology is seeking out malicious actors but the bad news is its success is revealing problems that hadn’t been previously recognised. For instance, SonicWall, which protects more than one million networks worldwide, has revealed that a new Capture Cloud engine has discovered hundreds of new malware variants not seen before by sandboxing technology. Through the use of previously unannounced patent- pending technology, SonicWall Capture Labs security researchers engineered an advanced method for identifying and mitigating threats through deep memory inspection, all in real time. “Threat actors have been so far ahead of the game they’ve been able to create highly evasive malware without the greater industry even knowing,” said SonicWall President and CEO Bill Conner. “This new real-time deep memory inspection technology, coupled with more than a decade of machine- learning experience, will help level the playing field and eliminate some of the most challenging attack vectors.” The new SonicWall Capture Cloud Real- Time Deep Memory Inspection (RTDMI) technology and engine has been operational for months and is discovering hundreds of malware strands not detected by sandboxing technology. New products are constantly emerging The good news is there are a multitude of security products out there offering new ways to protect your systems and INTELLIGENTCIO 59