Intelligent CISO Issue 39 | Page 41

EXPERT OPINION

Why attackers continue to target the network

Corey Nachreiner , CTO at WatchGuard Technologies , tells us that there is no cybersecurity ‘ silver bullet ’. He says : “ The challenging part of security is that it requires a layered approach including many protection strategies , both technical and human .”
Corey Nachreiner , CTO at WatchGuard Technologies ccording to the

A

WatchGuard Threat Lab ’ s recent Internet Security Report , network attack detections reached their highest level since 2018 peaks in Q4 2020 .
Total unique network attack signatures showed steady growth as well with a 4 % increase over Q3 . This shows that even as the world continues to operate remotely , the corporate network perimeter is still very much in play as threat actors continue to target onpremises assets .
Intelligent CISO spoke to Corey Nachreiner , CTO at WatchGuard Technologies , about why attackers continue to target the network .
We discussed why protecting onpremises corporate assets continues to matter and the importance of establishing a layered security posture that balances defences from network to endpoint .
Why is it important to help the cybersecurity stance of other organisations ?
In short , network protections still matter since your servers and network services reside within network perimeters – specifically your offices , data centres or private and public clouds . While endpoint protection can directly protect your users wherever they might be ( home and outside your perimeter ), servers need additional protections when exposed over a network . Things like firewalling , IPS , network malware protection , etc . are still critical . In fact , even though we saw malware following users into their homes during the pandemic , we also saw network attacks targeting software vulnerabilities in exposed services increasing at network perimeters ( such as on-premise and in the cloud ) and reaching an all-time high since 2018 .
It ’ s also important to note that there are classes of business and operational devices ( IoT and OT ) that cannot add endpoint-based security controls . Network-based protection is excellent at defending these IoT and OT devices .
How can cybersecurity truly become a ‘ community effort ’?
Whether you ’ re a security company , cybersecurity authority or just a business that ’ s experienced an www . intelligentciso . com
41