Skip to content
Techie News UK Logo
Menu
  • Home
Menu

Threats to enterprises – the evolving landscape

Posted on 25 June 2014

Enterprises are increasingly being targeted with advanced malware and those with critical infrastructure or supporting critical national infrastructure are primary targets.

Targeted cyber-attacks, one believed to be the key ingredients of sci-fi hacking movies, are increasing by the day in real world and being carried out by exploiting unique organisation-specific vulnerabilities.

We speak with Mark Gazit, CEO of ThetaRay on how enterprises can better equip themselves to defend against the evolving threat landscape.

Techie News: How has the threat landscape differed year-on-year?
Mark Gazit: The threat landscape has been evolving and becoming increasingly sophisticated — both on the cybercrime front, where actors are driven by monetary gain, and on the targeted attacks front, where adversaries can be professional criminals or even nation state actors.

Today’s attacks involve better planning, use more unknown malware, and involve advanced hacking skills. We are also seeing phenomena like Hacktivism become part of the mainstream landscape, and evolving into a threat that has become a concern to every organization and critical infrastructure operation.

TN: What advice do you have for businesses using Windows XP devices?
MG: They should be aware that their inability or unwillingness to upgrade their operating systems exposes them to threats they can’t even imagine.

Their security issues will not only grow with time, but worsen and remain unpatched, making it easier for attackers to exploit and breach their networks.

Of course, our first advice would be to upgrade, but that can be very challenging for organizations that are unable to shut down certain systems for an upgrade.

In such cases, the only other way to handle the situation is to estimate the potential damage from an attack (unplanned downtime can cost up to $8 million per day in certain sectors), plan the upgrade properly and, in the meantime, secure the organization with solutions that can detect unknown threats even after they have already infiltrated the organization.

TN: What kinds of threats are enterprises typically faced with & how does ThetaRay cater to secure against these threats?
MG: Today’s enterprises are faced with two types of threats – those coming for their employees’ bank accounts, and those coming for the company itself (stealing from bank accounts, intellectual property theft, causing disruption, inflicting destruction).

These threats have been plaguing organizations of all sizes for a few years now. The problem is that, more than ever before, attackers are using unknown malware and leveraging legitimate software and OS properties against their victims, which makes it nearly impossible to detect attacks.

The more time an attack remains undetected, the more damage it will end up causing. What ThetaRay does is use hyper-dimensional big data analytics in solutions that uncover unknown cyber and operational threats within minutes.

ThetaRay’s detection platform has the unique ability to monitor and simultaneously analyze all security and operational anomalies across multiple protocols and environments, enabling industrial and financial entities to detect and defeat threats before any damage can occur.

TN: What should they be doing to better protect their company?
MG: At this point, I think every company understands that its reliance on technology calls for an understanding of security for that environment, for its digital assets and for its customers.

To better secure themselves, companies, according to their size and budgets, should have a focal point responsible for IT security.

Their employees should be educated about risks, what security means, and how they can contribute to securing it. Employees have been taught to recycle; there is no reason they can’t help secure their IT and OT environments.

TN: What are the different industries doing to better secure themselves from potential attacks?
MG: Different industries are using a number of in-depth defense methodologies to better secure their organizations.

The typical setup involves layers of security that can include perimeter defense, anti-virus software, IDS/IPS solutions, and then the most crucial part – which is where too many fall short – deploying a solution that can find threats even after they have made it into the networks.

Finding those unknown threats can mean the difference between suffering an APT attack and discovering it in time.

TN: What, if anything, can be done on a government level to prevent an increase in enterprise IT security threats?
MG: When we talk about government, we’re talking about regulation and compliance. I think that governments all over the world understand the importance and impact of cybersecurity on their economies, and have been taking steps to guide organizations towards a more resilient security posture.

Some nations have already inaugurated national cybersecurity centrals to monitor their country’s cyberspace and handle issues raised by security vendors and local organizations.

The more the government provides information, enacts strict regulatory controls, and incentivizes organizations to deploy better security, the better it can help prevent an increase in enterprise security threats as a whole.

TN: Will the BYOD trend make malware a bigger issue for enterprises?
MG: BYOD has already made malware a bigger issue for enterprises. The fact that a sudden and uncontrollable stream of new devices has now entered a previously controlled environment makes it very hard for the security team to keep it secure.

The next big issue is how people use their own devices, which is far more lax and personal than they would ever use an employer’s device.

Here you see behaviors like jailbreaking phones, browsing over open WiFi, using outdated and vulnerable apps, and downloading games with concealed malware or data leaking components that could easily result in a malware infection on the device.

The prevalence of Android-based devices, combined with the fact that 96% of all mobile malware plagues this operating system, makes for a potent cocktail that can easily let malware into an enterprise.

TN: What should we expect from ThetaRay over the next year?
MG: We are preparing to announce the release of our solution, which will then go into general availability later this year. We are also speaking with a number of potential customers and investors, and look forward to a busy year.

Ravi
Ravi

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Norton Secure VPN Ad

Advertisement

Recent Posts

  • Most Watched Netflix Movies in the UK
  • 4 Best British Technology and Science YouTube Channels
  • Most Watched Netflix Movies in Ireland
  • 5 Weird Things That Surprise Tourist About Technology in Ireland
  • British And Irish Science Influencers on TikTok
Norton Secure VPN Ad

Advertisement

Categories

  • Apple
  • Apps
  • Books
  • Business
  • Cars
  • Cloud
  • Compliance
  • Entertainment
  • Featured
  • Future Tech
  • Gadgets
  • Gaming
  • General Tech
  • Global Tech News
  • Health
  • History
  • Industry Voice
  • Influencers
  • Management
  • Mobile
  • Open Source
  • Podcasts
  • Public Sector
  • Roundup
  • Science
  • Security
  • Software
  • Tablets
  • Techie Deals
  • Technology
  • UK & Ireland Tech News
  • Web
  • World
  • WTF
©2025 Techie News (UK and Ireland) | techienews.co.uk   Privacy Policy | Terms of Use | ***DMCA Policy***    🇬🇧 🇮🇪
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT