Cybersecurity evolved in a linear fashion at first. Technologies, processes, and controls were created to allow good traffic in and stop bad traffic. Firewalls, antivirus, email security, web security, IPS, and other sub-categories emerged within cybersecurity. Security professionals were preaching a “defense-at-depth” strategy where organizations would have security controls at the endpoints, the network edge, and the data-centre, to attempt and block potential breaches.
For a hacker, the goal was (relatively) simplistic: penetrate JUST ONE of these controls, and you own the network. If you are able to breach just one unpatched server, compromise one overlooked/un-updated laptop, send one successful phishing email, you were in. In fact, once inside the network, lateral movement was quite easy and could be done without being seen by network administrators.
In other words, to protect a corporate network, administrators had to be right at every single juncture on their network, and they had to be right 100% of the time, ALL the time. (Read more...)
*** This is a Security Bloggers Network syndicated blog from IntelliGO MDR Blog authored by Effi Lipsman. Read the original post at: https://www.intelligonetworks.com/blog/turning-the-tables-on-hackers

