by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : August and September 2016
SPONSORED CONTENT S -14 Cybercriminals. Now there’s nowhere to hide. Bring the power of network visibility to the security fight with GigaSECURE®, the world’s first Security Delivery Platform. It’s time to turn the tables on the attackers. To learn more visit: Carahsoft.com/innovation/Gigamon-Cyber V ISIBILITY INTO DATA is critical for security. If you can’t see the data, you can’t protect it. Data is traversing the physical and virtual worlds and could be on- premises or in the cloud. For enterpr ises that have data in such heterogeneous environments, breaches are almost a foregone conclusion because any network will have blind spots and adversaries will find and exploit those weaknesses. Most advanced persistent threats (A PTs) designed to steal data from victim networks will follow the A PT K ill Chain Model, which breaks down attacker behavior i nto six stages: network reconnaissance; a phishing or zero-day attack; installing backdoor malware on victims’ co mputers; lateral movement to discover victim networks; data gathering; and finally data exfiltration. It’s important to look for malicious activities across all stages of the kill chain. This includes lateral movement such as victim computers contacting their com ma nd and control server a nd malware making DNS queries to these servers. In these scena rios, organi zations can look to network metadata to provide an early warning system. Through metadata analysis, they can hone in on suspicious activity and then proceed with SIEMs, behavioral analytics, and machine learning tools to uncover or predict behavior of bad actors. Resolving the Encryption Issue A few years ago, only about five percent of data was encrypted. Gartner forecasts by next year as much as 50 to 80 percent of data will be encrypted and more than half of the threats will come through encrypted channels like SSL. Once considered a security mechanism, SSL has now become a dangerous threat vector. Again , what you can’t see, you can’t protect. That’s why it is critical both to see data that’s in the clear and to decr ypt any encrypted data so nothing is missed. The problem is that many cybersecurity tools either aren’t capable of decryption or would take a major performance hit during the process. Instead, what’s needed is an effective and efficient way to offload SSL decryption and continue to provide your cybersecurity tools with full visibility of all traffic to detect and prevent malware and other attacks. Intelligent, Pervasive Visibility Across All Environments All is the key. Traditional security solutions will only perform at a limited level unless they’re informed by intelligent, pervasive data visibility across all traffic—including the physical network , the virtual space, software -defined networks, and in the cloud. Due to limited budgets, government agencies may be consideri ng the cloud. However, they may also be delaying adoption because they are concer ned that they’ll lack the necessar y visibility to protect their mission- critical data. If they were guaranteed pervasive visibility before all else, they could defend data regardless of where it travels and where it resides and be more assu red of keeping ahead of potential attackers at mi ni mal cost. Dennis Reilly is Vice President of Federal, Gigamon. DENNIS REILLY VICE PRESIDENT OF FEDER AL, GIGAMON PERVASIVE VISIBILITY: KEY TO DATA SECURITY To keep ahead of potential attackers, agencies need to have a clear view of what is happening on their networks. CYBER RESILIENCE What you can’t see, you can’t protect. That’s why it is critical both to see data that’s in the clear and to decrypt any encrypted data so nothing is missed.
June and July 2016
October and November 2016