Get new articles and guides, a curated list of events and job openings, and more. Sign up now.
A Successful Security Strategy Is All About Relationships. Here’s How to Build Them.
Security efforts are not limited to security teams. High impact strategies need to engage everyone from employees to the board of execs, DevOps teams and IT. Learn how how to become not just an effective partner but a trusted advisor across an organization.
Stateful Machine Learning is Our Best (And Only) Bet
Traditional machine learning methods that are used to detect threats at the machine layer aren’t equipped to account for the complexities of human relationships and behaviors across businesses over time. There is no concept of “state” — the additional variable that makes human-layer security problems so complex.
Tessian CTO and Co-founder, Ed Bishop was joined by Jeff Hancock (Prof. at Stanford University) and David Kennedy (Co-founder and Chief Hacking Officer at TrustedSec) to talk about how hackers have capitalized on the pandemic, and what can be done to stop them.
Watch the full interview here, or read on for three of Ed’s key takeaways.
People are easier to manipulate when they are working from home
JH: When we change environments as radically as we have over the pandemic – moving from working in an office to working at home – it requires a mindset shift. Classically, we see the office as a psychological space where we’re familiar with what is safe, and what is not. When this is disrupted, it’s not that we become more careless or stupid…we just need some time to adjust to the new environment. This is the case because some of our cognition resides in our environment, and attackers take advantage of that.
Another similar idea is that of ‘places’. Most of the time people have three places – home, work, and where they have fun. Combining two places into one is challenging psychologically, and makes users more vulnerable to attacks. This is because at home, we are without all of the usual cues that remind us to think about cybersecurity, and we also don’t have a colleague to turn to in the way that we usually would. This vulnerable state does not last forever, but it is a huge disruption.
Attackers will use hot topics and high-profile global events to gain access to systems
DK: When people moved to work from home, the cyber landscape changed, but the vast majority of companies provided no additional security training to keep up with it. In contrast, thetechniques that attackers use change very rapidly with major events and the changing world.
One of the very first cases that we saw of leveraging real-world events for social engineering was when Patrick Swayze passed away. Cybercriminals used Google to attack users. Shortly after Swayze’s death, if you Googled ‘Patrick Swayze death’ and clicked on the first search result, it would deliver malware to your computer. This campaign was highly successful – infecting tens of thousands of machines before Google managed to take it down.
Since then, there has been a number of examples of this type of attack. What is clear is that attackers will use this type of information very quickly – spinning it into something that they can use to gain trust and access your systems.
Attacks are becoming more targeted and sophisticated, and security education needs to reflect this
DK: These days, attacks often involve highly specialized infiltration groups that focus on open-source intelligence gathering and understanding your employees, their positions, and the technologies use. Attackers then craft pretexts for attacks directly off information that would be used within your own environment. These attacks are typically targeted against 1-3 individuals and are incredibly hard to defend against because they have a low ratio of detection versus commodity attacks that often target thousands of employees.
A recent attack I saw involved an employee being contacted by an attacker pretending to be from the IT department to gain access to their device. What attacks like this tell us is that during times of disruption, not a lot of people know what ‘normal’ looks like, and attackers take advantage of this. So, our work from home cybersecurity strategy needs to be very simplistic, and involve ongoing education that includes real-world examples.
JH: Legitimacy and trust play a part in the human psyche, and we use heuristics that we have evolved over many millennia. So if we encounter someone who knows a lot about us, our friends, and our network, we believe they are likely to be a ‘friend’, not a ‘foe’. For example, we recently had a case where an attacker used Google Maps Streetview to identify a plumbing van outside a user’s house. They then referred to ‘recent plumbing issues’ to convince the user that they were their neighbor.
So, to keep up with the creativity of attackers we have to think of security education as a journey, not a destination. We also need employees to believe in their company, to feel that their company is on a journey to something big. When employees believe in the company they want to help it move forward, and security falls into place.
For more on how crises can change the cybersecurity landscape, watch the full discussion, here.
Co-Founder and Chief Technology Officer, Tessian
Ed is the Chief Technology Officer and co-founder of Human Layer Security company Tessian. He is responsible for leading the engineering, product and data science teams. Following a career in M&A, Ed co-founded the company and built the early platform which uses machine learning to protect people from risks on email like data exfiltration, accidental data loss and phishing.