ExtraHop, the leader in cloud-native network detection and response, announced its top predictions for the cybersecurity and technology industries in 2020. Informed by insight from customers, partners and industry analysts and insiders, ExtraHop leaders predict a year of tool consolidation, headline-grabbing breaches and a shifting industry focus on what makes a successful tech start-up. The Year of Deeper Scrutiny for Fast-Growth Companies: “2019 was a tough year for heavily hyped, fast-growth companies going public in Silicon Valley. Several companies that raised huge rounds ultimately failed to deliver expected results or even approach profitability after they went public, and Wall Street was not amused. In 2020, we expect the investment community to more deeply scrutinize companies' financials and business fundamentals, ultimately leading to the support of companies who deliver on their promises, are capital-efficient with sound vision and innovation, and have truly sustainable business results and models to back them up.” - Arif Kareem, CEO File hashing has been the default mechanism for detecting malicious threat activity" Antiquated Threat Detection Methods like File Hashing and Signature-Based IDS Waste Time: “Since the 1990s, file hashing has been the default mechanism for detecting malicious threat activity, despite the fact that it's ineffective against modern attacks that use polymorphic or fileless methods to go undetected. The same goes for signature-based IDS, which are extremely noisy while providing very little actual alert context. Security teams will continue to rely on these antiquated methods of detection because they are expected to, regardless of how well they work in today's threat landscape.” - Jesse Rothstein, CTO and co-founder Accountability for the Ethical Use of Users’ Data: “Recent headlines tell of giant data corporations like Google and Facebook monetizing users' data and lacking sufficient transparency in these activities. There’s already been significant social backlash, but in 2020 we predict that users will demand companies not just follow the often-dated laws, but that they also do what’s right. Regulations like GDPR and CCPA are helping to bring more clarity around what’s appropriate, but 2020 will be the year that the industry is held accountable for the ethical, in addition to regulatory-compliant, use of personal data.” - Raja Mukerji, CCO and co-founder A Slowing Economy Will Force Tool Consolidation: “In security programs, it's been very difficult to turn tools off. What gaps will I create? What unintended consequences will I see? As the economy has rolled along over the last decade, most security programs have had the necessary funding to add new tools and retain legacy tools under the guise of risk management. Economic slowdown is likely to change all of that, as investments in new technology will require cost savings elsewhere. A tighter economy will finally cause us to pull the plug on legacy security tools.” - Bill Ruckelshaus, CFO A tighter economy will finally cause us to pull the plug on legacy security tools""Observability" Will Gain Ground as Both a Concept and a Vocabulary Term in Security and DevOps: “Observability is a term that several companies are using to describe the practice of capturing metrics, logs and wire telemetry, or sometimes other data sources, mostly in the DevOps space. The value of correlating insights from these data sources has gained enough ground that vendors need a word for it. Observability, The SOC Visibility Triad, and other terms have been spotted in marketing materials and on big screens and main stages at security and analytics conferences. In 2020, we'll see heated competition to control the vocabulary and mental models that enterprises and vendors use to discuss and market security best practices regarding gathering multiple data sources and correlating insights between them.”- John Matthews, CIO A Major Information Leak from a Cloud Provider is Coming: “In 2020, we are likely to see a major information leak from a cloud provider. While at the same time the cloud providers are providing many useful built-in tools, it's not clear that they are using their own tools to secure themselves. As a further prediction, the leak will not effectively diminish migration to the cloud. As we have noticed with other breaches, they do not significantly erode confidence in the services.” - Jeff Costlow, CISO 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers" The Wave Begins Towards Security Tool Consolidation: “Organisations will take a strong look at the number of security vendors within their ecosystem in 2020 to determine overlap and begin a move towards consolidation of tools. The winners will include those that have proven their API superiority and ability to work together within an organisation’s ecosystem. The losers will be those who have not proven their ability to strengthen core security.” - Chris Lehman, SVP of Worldwide Sales A Vendor Will Be Responsible for a Major Breach of Data Due to Phoning Home: “In 2019, ExtraHop issued a security advisory about the vendor practice of phoning data home and how this is happening without the knowledge of customers. The problem with this practice is that it expands the attack surface via which that data can be breached, exposing it to threats within the vendor’s environment. 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers. Regulations like GDPR have imagined exactly this type of scenario and laid out specific requirements for data controllers and data processors. But when such a breach occurs, it will have broad impact and implications.” - Matt Cauthorn, VP Security The Big IoT Breach is Coming: “In 2017, major ransomware attacks crippled the networks, and operations, of major global organisations. While those attacks did billions in damage, for the most part, IoT devices were left unscathed. But sooner or later, and probably sooner, the big IoT breach is coming, and it could have global implications. Whether it happens in the US or abroad, in healthcare, shipping and logistics, or manufacturing, IoT devices around the globe are fertile hunting grounds for attackers. Taking down every connected device, from telemetry sensors to infusion pumps to mobile points-of-sale, could easily grind operations to a halt.” - Mike Campfield, VP of Global Security Programs
Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally known public safety consultant, studies this premise in his 2013 book: Mass Shootings: Six Steps to Survival. “To survive, you have to be mentally prepared,” Matthews says. “You have to know what to do the minute the first shots ring out.” For his book, Matthews researched 60 mass shootings that occurred between 1980 and 2010. As part of his research, he talked to those who survived and asked them how they managed to stay alive. “The book is designed for corporate security and safety managers who can effectively train their work forces and mitigate the harm from these attacks,” says Matthews. Matthews summarizes his six steps with the acronym ESCAPE: Exit when possible without presenting a target Seek cover to protect yourself from harm Conceal yourself from the offenders Assess all alternatives Present a small target Engage only as a last resort It is a more detailed take on the traditional advice offered by law enforcement: If you hear shots or explosions, run. If you can’t run, find a place to hide. If you can’t run or hide, fight — but only as a last resort. Run From The Gunshots Matthews observes that it frequently takes people several moments to realize that gunshots are gunshots and not firecrackers or vehicle engine backfires. “If you are a teacher in a school, an employee in a post office or a worker in an office building and hear sounds similar to gunshots,” writes Matthews, “you should recognize that firecrackers or other pyrotechnics are not normal for your workplace and immediately take action.” As soon as you hear a gunshot — exit as soon as possible. Don’t present a target. Run in a direction away from the shots. Go outside. Get away from the building and call 911. He also advises that you plan your escape ahead of time. Learn where the doors in your building are located. When something happens, head in the direction of the closest door that is farthest away from the trouble. If you are caring for children, the elderly or patients and have to get them out of the building, another part of your task will be to keep everyone calm, focused and moving forward. Matthews also warns against running when it would expose you to the shooter. You might have to crawl army-style across the floor and find a temporary hiding place. When you get outside, keep your hands in plain view so that responding police officers can see that you do not have a weapon. Matthews researched 60 mass shootings and interviewed survivorsto assess the best way to escape a shooting unharmed If You Can’t Run, Hide Or Take Cover According to Matthews, there are two ways to hide. You can conceal yourself or take cover. Your first choice should be to seek cover that will protect you from harm. Matthews suggests parked cars, cement barriers in parking lots, brick walls and other solid masses that will stop bullets. If there is no place to take cover, concealing yourself behind bushes, trees, banners and other non-transparent objects is the next best thing. Inside a building, take cover behind large filing cabinets and heavy equipment. Matthews notes that locked rooms can be effective hiding places. Block the door with furniture. Lock the windows. Turn off the lights and stay low. If there is more furniture in the room, hide behind it. In the events that Matthews studied, a number of people tried to conceal themselves under desks. All too often, they were found and shot. Desks aren’t cover or concealment. Don’t pop out of your hiding place because the shooting has stopped. There’s a good chance the shooter is simply reloading and getting ready for another onslaught. From your place of concealment, assess all possible alternatives before deciding on what to do next. If you decide that you can escape the building, move out, while presenting a small target. For instance, you might decide to stay low and crawl on all fours, keeping yourself in a tight compact ball. Such a small target is harder for a shooter to hit, explains Matthews. As A Last Resort, Fight While studying active shooting events, Matthews discovered that “when a single individual engages an armed offender, the individual almost always loses.” That is why fighting must be viewed as the absolute last resort. In light of this, if fighting does become necessary, find others to help you fight. Even when you have assembled a group, don’t simply jump up and rush the shooter. Make a plan. Matthews cites a case in which a group laid low until the shooter stopped to reload. Then they attacked and quickly subdued him. The ultimate goal is to do as little as you can to extricate yourself. Run away as soon as you hear shots. If you’re lucky the event will be essentially over for you. If you can’t run, hide and wait for a chance to run. If you don’t see an opportunity to run, wait out the event in the safety of your hiding place. If you have to fight, fight hard and fight smart.
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload