Are Threat Detection and Cyber Security Systems Working?

October 26, 2021

I read “Microsoft: Russian SVR Hacked at Least 14 IT Supply Chain Firms Since May.” The write up states:

Microsoft says the Russian-backed Nobelium threat group behind last year’s SolarWinds hack is still targeting the global IT supply chain, with 140 managed service providers (MSPs) and cloud service providers attacked and at least 14 breached since May 2021. This campaign shares all the signs of Nobelium’s approach to compromising a significant list of targets by breaching their service provider.

That’s interesting. At first glance, it seems as if a small number of targets succumbed.

On the other hand, it raises some questions:

  1. What cyber security and threat detection systems were in use at the 14 outfits breached?
  2. What caused the failure of the cyber security systems? Human error, lousy cyber security methods, or super crafty bad actors like insiders?
  3. Is a 10 percent failure rate acceptable? Microsoft seems agitated, but why didn’t Microsoft’s security protect 10 percent of the targets?

Each week I am invited to webinars to learn about advanced security systems. Am I to assume that if I receive 10 invites, one invite will be from an outfit whose technology cannot protect me?

The reports of breaches, the powers of giant software outfits, and the success of most companies in protecting themselves is somewhat cheering.

On the other hand, a known group operating for more than a year is still bedeviling some organizations. Why?

Stephen E Arnold, October 26, 2021

Comments

Comments are closed.

  • Archives

  • Recent Posts

  • Meta