Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

RSA Attendees State the Obvious During Floor Survey (Brief)

Last week at the RSA Conference, nCircle surveyed 205 people about their thoughts on various security measures and their effectiveness against state-sponsored attacks. The survey focused on endpoint protections and perimeter defenses.

Last week at the RSA Conference, nCircle surveyed 205 people about their thoughts on various security measures and their effectiveness against state-sponsored attacks. The survey focused on endpoint protections and perimeter defenses.

Accordingly, 59% of respondents say firewalls are no longer effective against those types of attacks; 48% said antivirus software isn’t effective; and 39% said intrusion detection systems (IDS) and intrusion prevention systems (IPS) are no longer effective. If anything, this proves that some of the people attending RSA last week had some sort of clue when it comes to taking on the challenge of stopping a motivated attacker.

These days, it isn’t about stopping the attack – often you can’t no matter what you do, or it is just a matter of time and if a criminal wants you they’ll get you. Security is about responding faster, mitigating damage, and recovery and business continuity. Stopping the small fish is still part of the game, but from there, intelligence on the network is the only way you can tell if there are sharks in your pond.

“Security professionals know we live in a world where state sponsored attacks are common and they also know that many legacy security systems that are updated after exploits or malware become public knowledge are no longer effective against these attacks,” noted Lamar Bailey, director of security research and development.

“Plugging in a firewall, IPS, or IDS and setting auto update doesn’t offer enough protection against sophisticated cyber attacks,” Bailey said.  “IT security professionals know they can no longer sit passively on the sidelines and assume security technology wil protect them.”

Related Insight: Advanced Threat Protection & Visibility: Nation States

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...