Advertisement
Singapore markets closed
  • Straits Times Index

    3,439.88
    +24.37 (+0.71%)
     
  • S&P 500

    5,537.02
    +28.01 (+0.51%)
     
  • Dow

    39,308.00
    -23.90 (-0.06%)
     
  • Nasdaq

    18,188.30
    +159.54 (+0.88%)
     
  • Bitcoin USD

    57,900.18
    -2,307.36 (-3.83%)
     
  • CMC Crypto 200

    1,213.32
    -47.86 (-3.80%)
     
  • FTSE 100

    8,238.52
    +67.40 (+0.82%)
     
  • Gold

    2,369.40
    0.00 (0.00%)
     
  • Crude Oil

    83.40
    -0.48 (-0.57%)
     
  • 10-Yr Bond

    4.3550
    -0.0810 (-1.83%)
     
  • Nikkei

    40,913.65
    +332.89 (+0.82%)
     
  • Hang Seng

    18,028.28
    +49.71 (+0.28%)
     
  • FTSE Bursa Malaysia

    1,616.75
    +1.43 (+0.09%)
     
  • Jakarta Composite Index

    7,220.89
    +24.13 (+0.34%)
     
  • PSE Index

    6,507.49
    +57.46 (+0.89%)
     

The cybersecurity parasite hiding in plain sight

The battle against hidden adversaries within encrypted traffic is ongoing, but innovative technologies offer a path forward.

One of the major twists in the critically acclaimed film "Parasite" was learning that the housekeeper's husband had been living in the home's bunker for many years. The world of cybersecurity frequently goes through its own twists and turns, with the most cunning opponents hidden in plain sight, much like the plot of this riveting movie.

Despite the awareness of the risk of malware, a recent hybrid cloud security survey conducted by Gigamon in Singapore revealed that only 23% of organisations have visibility into encrypted data from the network level to the application level. This lack of visibility is exacerbated by the fact that just 30% of companies have visibility into East-West or laterally moving traffic. Furthermore, 43% reported they have good network visibility but limited container-level visibility.

ADVERTISEMENT

Cyber adversaries utilise encryption to hide their actions within genuine digital traffic, much as parasites in the natural world disguise themselves to infect their hosts. This deceptive concealment poses a persistent challenge to cybersecurity professionals, who must unravel these digital disguises to protect their organizations from hidden threats.

So, in this world of hidden adversaries and encrypted mysteries, where does the concept of Zero Trust fit in? Are we destined to be blindsided by threats lurking within our digital “house”, or can we adapt our cybersecurity practices to reveal hidden adversaries within encrypted traffic? The answer, I think, is a solution that provides deep observability into cloud traffic to give you a hidden view of what is really going on inside.

Unveiling the hidden adversary in encrypted traffic

More than a quarter of IT and security leaders in Singapore express complete confidence in their whole hybrid cloud infrastructure, with another 66% expressing some level of confidence. All of them have, however, had breaches in recent months, much like parasites silently draining vital resources from their host. While efforts have been made to improve overall security posture, the underlying issue is the limitations of their existing tools, which struggle to detect hidden adversaries, particularly within encrypted cloud traffic. This underscores the challenges of hybrid cloud security.

As we navigate these complex challenges, innovative technology solutions emerge that can aid in our quest to eliminate blind spots within encrypted traffic. These solutions function as our digital detectives, tirelessly sleuthing to reveal hidden adversaries without compromising the security that encryption provides.

By incorporating the principles of Zero Trust, organisations can ensure that their cybersecurity strategies remain vigilant, even within the encrypted realm.

Front-running encryption with innovative technology

Encryption serves as a fundamental concept in the Zero Trust framework, emphasising the need to verify every entity and transaction, even within the encrypted realm. Traditionally, one might consider decryption as a way of mitigating this risk. However, out-of-band decryption for East-West traffic within networks has become more impractical and intrusive due to advancements in encryption technology, such as Perfect Forward Secrecy (PFS) within TLS 1.3. Additionally, decrypting active messages could interfere with performance and resource availability.

By incorporating the principles of Zero Trust, organisations strike a balance between security and privacy. By utilising innovative technologies that enable deep observability into encrypted traffic while upholding the principle of "never trust, always verify," they make sure that potential threats are exposed without jeopardizing the security that encryption provides.

An equally promising approach is one that can detect suspicious encrypted traffic patterns and anomalies before they are encrypted, effectively "front-running" encryption. This allows organizations to identify potential threats at an earlier stage before encryption cloaks their malicious intent. There are even technology updates now that allow front-running encryption to be simplified.

An example is Gigamon Precryption technology, a new innovation that utilises plain text to transform, analyse, and route encrypted cloud traffic, offering deep observability and enhancing SecOps threat-hunting capabilities. This means that organisations can gain invaluable insights into message and packet visibility down to the kernel level while steadfastly maintaining the confidentiality of their encryption, effectively bolstering their Zero Trust security posture.

Illuminating the hidden adversaries

The battle against hidden adversaries within encrypted traffic is ongoing, but innovative technologies like Precryption offer a promising path forward. Much like the unexpected revelation in the movie "Parasite" that changed the course of events by revealing a hidden presence within the family, cybersecurity experts today can similarly unveil concealed threats lurking within their digital "house”.

By shedding light on these concealed threats at their inception, organisations can navigate the intricate cybersecurity landscape with increased confidence and resilience, all while upholding the principles of Zero Trust – ultimately leading to a safer and more secure future.

Michael Hakkert is the vice president for Corporate Marketing at Gigamon

See Also: