• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Advanced cyber-attacks are no longer reserved only for well-funded organizations


By VARINDIA - 2022-04-09
Advanced cyber-attacks are no longer reserved only for well-funded organizations

 Surojit Dasgupta, Country Manager - India and SAARC, Lookout
 

Impact of cyber-attacks on the critical infrastructure of companies
 

IT and security teams no longer have to worry just about data that exists within the four walls of their network perimeter. In fact, that perimeter has disappeared

  • With expanded reliance on cloud services, employees working from anywhere, and data constantly moving between managed and unmanaged devices and networks, the security ecosystem has become far more complex. 
  • Attackers know that visibility is an issue for most organizations and take advantage of that to use discrete compromise tactics to grant themselves access to sensitive data. 
     

There has also been massive growth in the malware-as-a-service (MaaS) market, which makes it easier for less sophisticated actors to execute advanced attacks. 

  • This means that advanced cyberattacks are no longer reserved for well-funded groups and nation state actors. 
  • As cybercrime groups sell their malware, the income will help them fund research into more advanced tactics and hiring more talent. They run themselves like small businesses. 


Managing critical events and emergency incidents

It is critical that IT and security teams have a disaster recovery plan in place, and that the plan is locally accessible. 

  • This helps ensure that they can access it in the chance an attacker locks them out of their cloud infrastructure. 
  • There should also be measures in place that help contain the threat wherever it happens so it cannot spread to additional parts of the infrastructure or infect third party solutions that you have integrated with your infrastructure. 


The solutions to protect the infrastructure

The Lookout Security Platform enables organizations of all industries and sizes to protect data as it moves between countless users, devices, and networks both in the cloud and on-premises. 

  • Pulling together mobile security, cloud access security broker (CASB), zero trust network access (ZTNA), and secure web gateway (SWG) brings together a number of critical elements for protecting data and enabling a zero trust approach to infrastructure security. 
  • By understanding the context under which a user is trying to access data, the content they’re trying to access, and the risk they could pose based on the posture of their account or device, admins can implement intelligent policies that proactively protect sensitive data from being compromised. 


On the Increase of cyberattacks

Threat actors will always take advantage of social or political uncertainty to increase the likelihood that their attacks are successful. 

  • When people are uncertain about where to turn for reliable information, they will take whatever they can get. Attackers use this to their advantage to execute socially engineered phishing campaigns and compromise corporate credentials. 
  • Internal security teams might also be focusing their resources on enabling hybrid work, which could leave existing legacy systems vulnerable or without much surveillance. 
  • It’s impossible to manually oversee every asset all the time, which is why it’s so important to ensure you have proactive coverage in place for any potential entry point that an attacker could have.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.