Hewlett Packard Enterprise (HPE) has recommended CSO strategies for security professionals to defend against cyber attackers.
Enterprise professionals in the security segment can encrypt data at rest, in motion and in use, the information is rendered useless to the attackers, restricting their ability to sell and reducing profits. Limit the financial rewards adversaries can realize from an attack on the enterprise by implementing end-to-end encryption solutions, such as HPE SecureData.
The expansion of mobile and IoT has increased the possible attack surface. Organizations must build security into their development processes, and focus on protecting the interactions between data, apps and users regardless of device to better mitigate and disrupt adversary attacks.
New technologies such as deception grids provide methods of trapping, monitoring and learning from attackers as they navigate their way through a realistic duplication of the network. Enterprises can use this information to better protect their real network, disrupt similar attacks before they begin, and slow down the progress of attackers.
Meanwhile, The Business of Hacking, a report assessing the economy driving cybercrime, prepared by HPE says the profile of typical cyber attackers and interconnected nature of their underground economy have evolved in the last several years.
Adversaries are increasingly leveraging sophisticated management principles in the creation and expansion of their operations to ultimately increase their impact and financial profits, which are both core motivations for nearly all attack groups today. Enterprises can use this inside knowledge against the attackers to disrupt the organizational structure and mitigate their risks.
“Organizations that think of cybersecurity as purely another checkbox to mark, often do not leverage the value in high fidelity cybersecurity intelligence,” said Andrzej Kawalec, head of HPE Security Research and Chief Technology Officer, HPE Security Services, Hewlett Packard Enterprise.