Q: The recent breach at Panamanian law firm Mossack Fonseca and many other firms shows how cyber criminals are able to siphon out huge amounts of data from inside a network without being detected. What exactly is it that organizations are failing to do in this regard? Why are they unable to detect such massive data theft until after it happens?
Paul Martini: Many organization and vendors are focused on defense; blocking malware by building bigger and thicker walls. Yet, we all agree that detecting 100% of malware is unrealistic. Even 99.99% detection of malware is not sufficient because the .01% that does get through is likely the malware you should be the most worried about. If you ask organizations what solutions they have in place to detect infections that have never before been classified and are unknown, are masking CnC communications or malware that has breached the perimeter and is now lurking inside the network, you get mixed responses.
Based on multiple reports, we know that most of the data is stolen within minutes after a breach. This is why defensive tools are critical, but it's just as critical to have continuous monitoring for infections that may already be inside the network, if not even more important. Tools such as Data Anomaly detection and Containment as well as advanced cyber analytics that can monitor and analyze deviations from the norm and alert you, are imperative in today's threat environment. Such tools can help identify a breach even if none of the perimeter defenses have been triggered.
Q: How is cloud computing complicating the data leak prevention challenge? How difficult is it for enterprises to simply extend their on-premises DLP to the cloud?
Martini: With the move to the cloud, many applications crucial to managing business operations, such as payroll, help desk and repositories, are now in the cloud. In the past, monitoring access was easier because these services were local and you had more control over access and applying signature-based DLP against this access. Now, the combination of services offered in the cloud, along with the growth of distributed enterprises and mobile users, makes it more difficult to manage the who, what, and when of these services, since the requests are going direct-to-cloud. Also, the encrypted communication between the user and the system increases the complexity of applying traditional signature-based DLP.
Just like these services are moving to the cloud, the network edge is also moving to the cloud. New cloud security platforms leverage security at the perimeter edge, when it's in the cloud, yet [they] also secure the perimeter edge locally, for these networks when it's required. In addition, behavioral-based approaches to anomalous data moving to and from the cloud increase the ability to detect data loss much more effectively than the traditional signature-based approaches. It does so by correlating data access based on users in the organization and then matching how users traditionally leverage these cloud services to detect anomalies. This is effective in pinpointing unauthorized access to these cloud services and detecting breaches.
Q: What is it you want the audience at Black Hat USA to know about web gateway products that perhaps they do not understand as well as they should?
Martini: First, Web security has evolved and is no longer the browser-based security of the past. Today's Web security needs to be ‘Internet' security that secures all traffic beyond ports 80 and 443, in order to detect evasive protocols, which don't leverage web ports. Legacy security suffers from blind spots because they only see two ports.
Second, how Web security is delivered has changed. In the past we had the option of on-premises hardware or cloud security. Both had their limitations. Cloud security is appealing but many organizations are cloud adverse, or restricted from leveraging the cloud, which restricts them to on-premises solutions. Organizations should know that security delivered in the cloud should be based on containerized cloud architectures, which allow organizations to adopt the public cloud when it makes sense, such as for remote sites or mobile users, and then host the cloud in areas where it's desirable. This is now possible with clouds built on containers. They allow more flexibility, giving organizations more freedom to adopt the cloud and benefit from its advantages.