Fresh from the RSA Conference 2015, the international event ‘where the world talks security’, Clearswift are focussing in on how to avoid 2015 becoming the “Year of the Epic Breach.”
During his RSA Conference keynote speech, RSA President Amit Yoran likened protecting networks today to stumbling around in the dark. Discussing the changing security space, Yoran commented on how the rise of the internet has given way to a world in which the threat knows no bounds. While 2013 was known as the “Year of the Breach” and 2014 became the “Year of the Mega Breach”, is it possible to avoid 2015 becoming known as the “Year of the Epic Breach”?
Clearswift believe this is possible, and that it starts with accountability from the inside out. Reflecting on Yoran’s cautions about unbounded threats, they feel this also means that security should know no bounds as well.
In his latest post for Clearswift, Dr Guy Bunker explains that this hasn’t been the case yet, and, as such, a change is needed:
The walls of the perimeter have fallen down, but companies are still thinking small picture. “Either the terrain is wrong, or the map is wrong…The map we’re looking at simply doesn’t match the terrain, but we keep hoping it does,” Yoran said. Eventually, something has to give lest we continue as is until we get to the “Year of the Super Mega Epic Breach.”
It’s time for a change, and it starts internally. Yoran said, “The threats that matter most are the ones you can’t see.” While they may not be apparent at first glance, they’re right in front of us. The way companies collaborate, the way teams’ access and share data, the way employees leverage technology all lend a hand in contributing to the ever-present insider threat. But what if, as Yoran suggests, we use a new map to help us see in the dark? What if we focus on prioritizing the insider threat, not just protecting the perimeter we’re comfortable with, but the new perimeters afforded internal sources thanks to the very devices they can’t live without? The terrain has moved beyond a business’ front door, and the map needs to accommodate that. Insider threats (both malicious and inadvertent) are far more common than external threats, that doesn’t mean that you can ignore the external ones, but it does mean that you really can’t ignore the internal ones. Whether it is an external attack, or an internal malicious actor or just a mistake from an internal employee if the information falls into the wrong hands then the result is the same. It is a data breach.
We’re helping rewrite the map, and essentially changing the game, with our launch of ARgon for Email earlier this month. Clearswift’s world first adaptive data loss prevention (DLP) solution which can be used with any email gateway solution enables companies to communicate and collaborate freely while reducing the risk from inbound and outbound information threats. We’ve got your company’s critical information covered, the rest is up to you.
To avoid the “Year of the Epic Breach,” and instead make 2015 the “Year of the Game Changer,” come play the game with us.
To find out more about Clearswift and what they can offer, speak to your SCC account manager or e-mail email@example.com.