Intelligent CIO Middle East Issue 42 | Page 19

LATEST INTELLIGENCE February 2018. The attack exploited an insecure Kubernetes console to launch a malicious cryptominer. Applications used to manage cloud deployments and misconfigurations also can pose a significant risk in cloud security, especially in increasingly complex, hybrid and fragmented networks. Internal exposures pose a significant risk in vulnerable operational technology networks. OT networks are still worryingly vulnerable, with attacks increasing by 10 percent in 2018 over the previous year. OT attacks can range in motive and impact, but the WannaCry outbreak in Taiwan Semiconductor Manufacturing Company is a prime example of how the combination of ransomware, worms and internal exposure can wreak havoc on a network – and a company’s bottom line. n Download whitepapers free from www.intelligentcio.com/me/whitepapers/ www.intelligentcio.com INTELLIGENTCIO 19