Ted Plumis, Vice President of World Wide Channel... » London, UK: Imperva Inc. has announced that Ted Plumis, vice president of World Wide Channels for Im... PixAlert launches integrated OCR capability to str... » PixAlert has introduced integrated, optical character recognition (OCR) capability to their portfoli... Blesma Chief Executive leads team to scale ne... » This summer, former Brigadier and Blesma Chief Executive, Barry Le Grys, will be leading a team of a... Championship teams unite in support of injured s... » Nottingham Forest and Bolton Wanderers players and fans pulled out all the stops on Saturday in supp... AdaptiveMobile launches SS7 Protection to sec... » DUBLIN & DALLAS: AdaptiveMobile has launched SS7 Protection – a new product that secures mobile oper... Portal wins 2015 IBM Beacon Award for Outstandin... » UK: Portal was named a winner of a 2015 IBM Beacon Award for Outstanding Solution for Midsize Busine... Moxa's new EDR-810 Firmware to support transpare... » Munich: Moxa has released a new firmware for the EDR-810 industrial 8+2G multiport secure router to ... Cubic receives additional $2.9 million training or... » SAN DIEGO, Calif.: Cubic Corporation has been awarded a contract modification valued at more than $2... Defence Secretary hails UK military for mission in... » Photo: MoD DEFENCE Secretary, Michael Fallon, has said that UK personnel have made a vital contribu... Quantum's Stornext cuts complexity with workload s... » SAN JOSE, Calif.: Quantum Corp. has announced a video surveillance solution certified with Milestone...

CLICK HERE TO

Advertise with Vigilance

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

London: Commenting on the system compromise of US-based security vendor Bit9, Venafi says that the cybercriminal incursion – whilst unfortunate – signals the significant changes in the threat landscape that have been taking place over the last few years.

 

According to Calum Macleod, EMEA Director with the Enterprise Key and Certificate Management (EKCM) solutions specialist, just as the hacktivist force behind the Anonymous collective has gathered pace in recent times – culminating last April with Time classifying the cause in its top 100 of the world’s most influential people (http://ti.me/WGnERB) - so the cybercriminal landscape has also changed.

“It’s a much darker threats landscape that IT security professionals are now dealing with, with trust – amongst clients, peer organisations and employees – having become an incredibly fragile, but essential, part of the security fabric of business,” he said.

“This situation is compounded by the fact that executives - even those in IT security arena - have little to no understanding of how truly fragile trust is today. A few kilobytes of cryptographic data can mean the difference between a company losing millions from the serious financial and reputational consequences that result,” he added.

The Venafi EMEA Director went on to say that, every business and government now relies on cryptographic keys and certificates to provide and ensure these levels of trust.

These technologies, he explained, are behind what makes society function today —from card payments, online shopping, all the way to smartphones and cloud computing.

And in parallel with this, he says, the ability to measure and track trust has also changed in what is an increasingly global and interconnected world.

Unfortunately, adds Macleod, cybercriminals now understand how fragile our ability to control trust has become.

“Malware like Flame and Stuxnet - and targeted attacks such as those on Bit9 - are just some of the examples of the escalating and accelerating attacks on trust in a business landscape that relies on technology,” he said.

“The only certainty that can be drawn from this event is that these types of attacks – and their underlying methodologies - will explode as more cybercriminals become aware of their success,” he added.

 

“The inability to detect these attacks, take action - and ultimately the pervasiveness of cryptographic keys and certificates, plus the protocols that depend on them – means that criminals of all types will increasingly continue to turn their attention to these attacks.