Lieberman Software released a new whitepaper this week called “Cyber Defense Review of Mandiant and Verizon Threats: How to Immediately Limit Attack Consequences.” In it, they lay out a step-by-step analysis, repudiating recent claims made by Mandiant and Verizon, and offer solutions for protecting organizations from the common phases of most cyber attacks.
Modern, advanced attacks are now launched on a nearly continuous basis against most enterprises. Many zero day attacks can easily penetrate conventional network perimeter defenses, allowing intruders to nest within the IT environment for extended periods of time. Once inside the network, attackers generally take these three common steps to expand their access, take control of the IT infrastructure, and access sensitive data:
- Establish a Foothold after an Initial Compromise
- Escalate Privileges and Attain Lateral Movement
- Extract Data and Conceal Tracks
CEO Phil Lieberman said “There’s an assertion among some cyber security firms that the types of zero day attacks that afflicted Sony Pictures, Home Depot and other enterprises are nearly impossible to block. Not only is this a fallacy, but we believe that with just a few simple changes in organizational IT behavior, and the deployment of automated security solutions, most cyber attacks can be contained.”
The whitepaper is available at HERE
[su_box title=”About Lieberman Software” style=”noise” box_color=”#0e0d0d”]
Lieberman Software proactively stops cyber attacks that bypass conventional enterprise defenses and penetrate the network perimeter. The company provides award-winning privilege management and security management products to more than 1,400 customers worldwide, including nearly half of the US Fortune 50. By automatically locating, securing and auditing privileged accounts – both on-premises and in the cloud – Lieberman Software controls access to systems with sensitive data, and defends against malicious insiders, zero day attacks and other advanced cyber threats. Lieberman Software is headquartered in Los Angeles, CA, with offices and channel partners located around the world.[/su_box]
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.