In 2005, Gary McGraw and Brian Chess published a taxonomy of code vulnerabilities exploited by attackers. Today, the “Seven Pernicious Kingdoms” continue to be used by MITRE to classify vulnerabilities. With the onset of cloud computing, it is time to begin a new taxonomy that accounts for attacks on cloud infrastructure.
We at ShieldX Networks are very thrilled to confirm that we have been selected as a finalist in the highly coveted RSA Sandbox Contest. The Innovation Sandbox Contest is an opportunity to spotlight new approaches to information security technology, provides advice and counsel for entrepreneurs, and exposes the RSA Conference community to venture capitalists, industry experts, senior level business practitioners, and thought leaders. Please read RSA’s announcement here: https://www.businesswire.com/news/home/20180320005165/en/RSA-Conference-Announces-Finalists-2018-Innovation-Sandbox
According to the Telegraph, “65% of large businesses reported a cyber breach or attack in the past 12 months. Yet nine out of 10 businesses don’t even have an incident management plan in the event of a cyber breach.”*
We are in the midst of an accelerating technology shift from traditional on-premise solutions to the cloud. As such, there is growing demand to secure migrating workloads, data and assets. But do IT organizations have the right solutions and the will to catch up and meet this challenge head on?
“More than 75% of businesses are planning to implement multi-cloud architectures within the next 2 years (2018–2019).” 1
Yet “as much as 74%” of ESG surveyed professionals “abandon their traditional security controls because they are ineffective in the cloud environments” 2 they have – or are planning for.
Since our inception, we’ve worked to create a security solution that natively secures today’s modern enterprise IT infrastructure. One that stops forcing IT teams to slow down performance, application development and cloud adoption, or face taking on more risk and cost. Our solution? The first containerized, microservices platform for multi-cloud security.
Just as we learned thirty years ago, access control alone is not a sufficient defense, by itself. Or, to put it another way, it’s déjà vu all over again! Just as the access control provided by those first firewalls in the 1980s was not enough to secure the perimeter, micro-segmentation based on access control alone does not adequately solve the problem of lateral movement inside the multi-cloud.
Petya and its “X” variants such as NotPetya, Nyetya, Petrwrap and GoldenEye have become a contagion. Represented in global daily headlines, they appear to be involved in an evolutionary process, starting as a primitive, network worm and ransomware and transforming into something of far greater destructive, possibly deceptive, power. While NATO investigates a state actor behind these attacks, NotPetya has already claimed over 2000 victims and £100m in cost to companies like Reckitt Benckiser.
Micro-segmentation has become a de facto standard and requirement to manage highly virtualized data centers and cloud computing environments. According to a recent article by Jon Oltsik, ESG senior principal analyst and founder of the firm’s cybersecurity service, ESG research has uncovered that in 2017, “68%of enterprise organizations use some type of software-based micro-segmentation technology.”*
Founder & CEORatinder leads ShieldX and its mission as its central pivot point, drawing from a career as a successful serial entrepreneur and corporate leader, bringing with him his unique blend of business acumen, industry network and deep technical knowledge. + READ FULL BIO
ShieldX Networks, Inc.
2025 Gateway Place, Suite 400
San Jose, CA 95110 USA