Protecting data centers beyond detection
Simon Hartley
Cybersecurity Practice Leader @IBM | Business of Cybersecurity, Mobility, Quantum
"84% of breaches exploit the vulnerabilities in the application yet funding for IT defense vs. software assurance is 23 to 1" – DoD JFAC [i].
The perimeter-based model of network and end-point detection has a problem. Newer types of cyberattacks (zero-days) do not share the security industry’s historical preoccupation with networks. Instead they target weak links in software directly.
Today's cloud or virtualized data center are multi-vendor and sit at the end of long global supply chains making for huge attack surfaces.
The recent NotPetya [ii] and WannaCry [iii] attacks, for example, were not detected or prevented by traditional security controls. These attacks were able to scale rapidly, take down services, and drive up costs for government and commercial organizations around the world. Costs and delays came from the attacks themselves and detection-related alerting, triaging, after action reporting, and out-of-band patching.
Can better security be baked into the software itself, preventing the root cause of attacks rather than an increasingly costly treatment of symptoms?
The short answer is yes, and without the costs, overhead, and issues of bolting on traditional instrumenting or agenting approaches.
RunSafe’s Alkemist? transformation engine disrupts hacker economics to protect data centers. It automatically leverages innovative cyberhardening techniques to deny malware the uniformity necessary to propagate. It does so by eliminating an entire class of cyberattacks on software using a patented software transformation engine that preserves developers’ intent.
It can be automatically added to currently deployed or new build environments, a new layer of defense, complementing existing cybersecurity tools, processes, and training.
If you think that doing the same detection steps over and over again and expecting different results might be a problem, please reach out directly. Happy to share detailed white paper, run a demo, or expand on how we are protecting government and commercial customers harden data centers beyond traditional detection approaches.
Footnotes
[i] February 6, 2019, Joint Federated Assurance Center (JFAC) Advancing DoD Software Assurance (SwA)
Distribution Statement A: Approved for public release. Distribution is unlimited. DOPSR Case #19-S-0016
[ii] wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
[iii] wired.com/story/korea-accountable-wannacry-nsa-eternal-blue/
Technology Executive, Angel Investor, Trusted Board Member and Advisor
5 年I do believe the Runsafe technology helps. But my personal opinion is that any component subject to modification (tampering) is insufficient ... unfortunately in our current architectures that includes all solutions not rooted in immutable hardware. Software is called soft for a reason. Its malleable and can be changed.