Intelligent CIO Kuwait Issue 3 | Seite 11

LATEST INTELLIGENCE fact that cryptomining attacks are faster to execute, generate profit for the attacker over a longer period of time and often can occur without the victim’s knowledge. 2018 brought more examples of exploits derived from patches This phenomenon makes it ever more important for security teams to track exploitability and be able to quickly understand where and how to deploy temporary mitigations when immediate network-wide patching proves impossible. Cloud security is strong but not bulletproof. While cloud networks are relatively secure, attacks continue to occur like that against Tesla’s AWS network in February 2018. The attack exploited an insecure Kubernetes console to launch a malicious cryptominer. Applications used to manage cloud deployments and misconfigurations also can pose a significant risk in cloud security, especially in increasingly complex, hybrid and fragmented networks. Internal exposures pose a significant risk in vulnerable operational technology networks. OT networks are still worryingly vulnerable, with attacks increasing by 10 percent in 2018 over the previous year. OT attacks can range in motive and impact, but the WannaCry outbreak in Taiwan Semiconductor Manufacturing Company is a prime example of how the combination of ransomware, worms and internal exposure can wreak havoc on a network – and a company’s bottom line. n Download whitepapers free from www.intelligentcio.com/me/whitepapers/ www.intelligentcio.com INTELLIGENTCIO 11