Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
    big data analytics in transporation
    Turning Data Into Decisions: How Analytics Improves Transportation Strategy
    3 Min Read
    sales and data analytics
    How Data Analytics Improves Lead Management and Sales Results
    9 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Disrupting Nation State Hackers With the Security Basics
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Disrupting Nation State Hackers With the Security Basics
ITSecurity

Disrupting Nation State Hackers With the Security Basics

thu@duosecurity.com
thu@duosecurity.com
5 Min Read
SHARE

Contents
  • Why It’s So Hard to Secure Everything
  • How to Secure All The Things
  • Defend Against Lateral Movement

Earlier this year at the USENIX Enigma information security conference held in San Francisco, NSA’s Rob Joyce gave a talk, Disrupting Nation State Hackers on how to keep people like him (nation state and other types of hackers) out of their systems.

More Read

Mobile Application development
IoT has Changed the Face of Mobile Application Development
Evaluating Cloud Solutions: How to Create the Right Team for the Job
How will Analytics and the Internet of Things Influence Marketing in Coming Years?
How Consumers Foot the Bill for Data Breaches
5 Useful Tips To Manage Parse Migration the Right Way

Earlier this year at the USENIX Enigma information security conference held in San Francisco, NSA’s Rob Joyce gave a talk, Disrupting Nation State Hackers on how to keep people like him (nation state and other types of hackers) out of their systems.

Rob has been with the NSA for 25 years, and now works as head of their Tailored Access Operations (TAO) taskforce that hacks into systems of foreign adversaries, as Wired reported in January.

Why It’s So Hard to Secure Everything

Network boundaries are becoming more amorphous and blurred, due to:

  • Bring Your Own Device (BYOD) – Personal devices, including mobile phones, tablets and other devices are being trusted on your network
  • Cloud computing – By putting your data in the cloud, you’re putting trust in your cloud provider’s security protocols – but it’s still part of your risk and liability
  • Internet of Things (IoT) – Many elements of your building infrastructure (such as heating/cooling systems) are now part of your network and liability
  • Work from … anywhere – Logging in from different, possibly unsecured networks can put transmitted and accessed data at risk, especially if done with outdated devices

How to Secure All The Things

There are things organizations can do to protect against known vulnerabilities, malware and other ways attackers try to get in:

Upgrades and automatic patching – If there’s a known bug in software that’s exploitable, you should fix that and get it off your network.

Automatic patching that is beyond user control is ideal for security, as it cuts down on the hacker’s opportunity window between a vulnerability becoming public and actual execution.

Known vulnerabilities are used more often than zero-days, and are effective only because organizations don’t update as often as they should.

Implement application whitelisting – Establish a list of applications that have been granted permission to execute on your machines – when an app attempts to execute, it’ll be checked against the list before allowing it to run.

The concept of trusted devices and networks works in a similar way. Make a list of devices and networks that you allow to access your applications, and block any anonymous networks or certain locations based on a list of IP addresses.

Credential security – Rob notes that in almost any intrusion during the initial exploitation phase of hacking, attackers try to get credentials to gain legitimate access.

Monitoring and setting a baseline for normal user behavior can help you recognize when a user is acting differently once logged in with legit credentials.

Ensure you use the least privilege principle for your users’ accounts, and only allow a small number of accounts to have the keys to the kingdom.

And more authentication security – Eliminate the reuse of administrator credentials to servers, which can lead to wide-scale compromises.

Eliminate the use of hardcoded admin or other system-wide credentials, and ensure they’re not accessible on any devices.

Ensure all authentication is only done with modern protocols, keeping passwords out of plaintext. While most modern protocols don’t pass plaintext credentials, older ones do – and nation-state hackers do take advantage of the ones that are

Two-factor authentication – The use of two-factor technology makes it harder to steal credentials. It’s important to ensure that lost credentials doesn’t get turned into a pivot at a later stage, allowing for greater access

Defend Against Lateral Movement

Most networks have a hard outer shell, but soft gooey center. Here’s how you can harden it:

Network segmentation – Identify what you need to protect, segment and manage the trust to the most important places to make it difficult for hackers to access. Consider who really needs access, and again, employ least privilege.

Two-factor authentication – Again, use it everywhere to stop hackers from moving around inside your network. Attackers will leverage multiple stolen credentials or reused passwords to get closer to their target data.

Disable software you’re not using – While not new advice, this can greatly reduce the attack surface.

Watch the video for Rob Joyce’s full talk.

TAGGED:data securityhackers
Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

payment methods
How Data Analytics Is Transforming eCommerce Payments
Business Intelligence
cybersecurity essentials
Cybersecurity Essentials For Customer-Facing Platforms
Exclusive Infographic IT Security
ai for making lyric videos
How AI Is Revolutionizing Lyric Video Creation
Artificial Intelligence Exclusive
intersection of data and patient care
How Healthcare Careers Are Expanding at the Intersection of Data and Patient Care
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

big data security protocols
Big DataExclusiveSecurity

3 Essential Big Data Security Protocols To Be Aware Of

8 Min Read
IIoT and Industrial Internet of Things
ExclusiveInternet of ThingsSecurity

A Detailed Guide To Industrial IoT: Everything From Risks To Benefits

10 Min Read
artificial intelligence big data
Artificial IntelligenceBig DataPredictive Analytics

Artificial Intelligence in Healthcare: Major Opportunities and Challenges

4 Min Read
vendor data security
Security

Vendor Security is Key to Preventing Future Data Breaches

8 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?