Q1. What have breaches such as the one at SolarWinds and Accellion revealed about the kind of cyber threats/cyber risks that enterprise organizations are likely to face in the years ahead? What capabilities are organizations going to require in order to prevent, detect and respond to such attacks in a way as to minimize damage?
As we know well, there have certainly been many headlines this year involving "supply chain" breaches. This news should serve as a reminder to us all to be extra diligent in evaluating suppliers and their security practices to ensure the protection of intellectual property and customers' data. In the end, as any good security practitioner would preach, prevention is not 100%, zero days are unavoidable, and a defense-in-depth strategy is necessary to protect yourself the best you can.
We were victims, along with many others, of the Accellion FTA zero-day attack. What helped us minimize the impact was proper network segmentation, immediate vulnerability detection, fast patching, identification of indicators of compromise, and a well-prepared playbook, which significantly improved our time to remediation and containment speed.
The more we all can combine signals from different sources, add context and realize incident-driven awareness by mapping to the MITRE Att&ck Framework, the better off we will be. Emerging security platforms with contextual awareness will bring value over disparate tools stitched together.
Q2. What impact has the accelerated adoption of cloud and SaaS applications over the past year had on enterprise security? Where do the biggest gaps exist today in enterprise capabilities to deal with cloud security threats?
As more and more workloads move to the cloud, it has increased the overall attack surface. Shared security models with your Cloud Service Provider are still being understood, and while the basic controls are the same as your on-premises world, —vulnerability management, identity and access management, network security, endpoint protection, etc.—the target environments are completely different. Endpoints are going from boxes to virtual to serverless. Networks are now software defined. Workloads are ephemeral and ever-changing. Development is shifting-left, and expectations for security are that it is built-in, not bolted-on.
This change in environment for cloud and SaaS applications requires new solutions from security vendors. As network perimeters have eroded, it makes more sense for security tools to be cloud-based too. Rapid updates, reaching ever-increasing remote endpoints, service availability and disaster recovery are all taken care of by the vendor. Still data centers are not going away anytime soon, so hybrid solutions are required for the majority of enterprises, and DevSecOps requires a level of automation and integration that was not thought of 20 years ago. And as the sudden shift to remote workers caused companies to move quickly to SaaS applications, we must remember that these applications are prime targets for attackers, as they hold tons of valuable data.
Lastly, unless you are a cloud-only company, try to avoid buying a completely new set of security solutions for your cloud and SaaS environments. Having a consolidated view of your entire estate and familiar tools can eliminate or at least help reduce gaps in coverage.
Our world is changing, and attackers are getting more sophisticated in their approach. Fortunately, security vendors hire smart people too. With the right defense-in-depth strategy and appropriate funding, risk can be managed.
Q3. What do you expect people will want to hear about from Qualys at the Black Hat Asia 2021 virtual event? What is Qualys' main focus going to be at the event?
We are excited to be sponsoring this year's event, and as it's virtual, this allows many more people to participate. At Black Hat Asia, Qualys is focusing on the value we can bring to customers through one platform, one agent and one view delivering a single IT, compliance and security solution – from prevention to detection to response.
While Qualys is known for its market-leading Vulnerability Management, we have worked over the last several years to build a cloud-based platform to power our solutions. The Qualys Cloud Platform is FedRAMP certified and indexes over 8 trillion data points on Elasticsearch clusters, processes 2+ trillion security events per year, and performs more than 6 trillion IP scans and audits per year.
On the application side, we've added visibility to our platform by way of a free-offering, Global IT Asset inventory to provide visibility across all devices and environments. And expanded vulnerability management with the launch of Qualys VMDR (Vulnerability Management, Detection and Response), bringing built-in orchestration and allowing users to discover, assess, prioritize and patch critical vulnerabilities all from a single application. We've also leveraged this model to provide similar capabilities for SaaS security and compliance with the introduction earlier this year of Qualys SaaS Detection and Response.
Qualys now has more than 20 applications running off our cloud platform helping companies of all sizes to reduce their overall TCO for security and bringing valuable context and insights to risk management and compliance. We invite you to stop in and learn how you can eliminate silos and consolidate your IT, compliance and security stacks into a single platform.