<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/james-ley/rss" /><link>https://www.ivanti.com/blog/authors/james-ley</link><item><guid isPermaLink="false">f875a88d-0152-428b-b354-522f3ec5b064</guid><link>https://www.ivanti.com/blog/managing-security-threats-using-a-risk-based-approach</link><atom:author><atom:name>James Ley</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-ley</atom:uri></atom:author><category>Security</category><title>Managing Security Threats Using a Risk-Based Approach</title><description>&lt;p&gt;Since the pandemic began its felt like life has been viewed through the lens of continual risk management, “Should I go to the store/pub/shops/cinema”. What’s the risk? What’s the value of taking the risk, how do I mitigate as much of the risk as possible?&lt;/p&gt;

&lt;p&gt;With the covid rules relaxing in Australia live in-person conferences are now rolling out so it was with excited anticipation I recently attended the CISO Sydney event to talk about risk!&lt;/p&gt;

&lt;p&gt;The topic was not covid risk unsurprisingly but rather: ‘Gain Compliance Using a Risk-Based Approach with Less Effort’. In this blog I’m going to detail how you can achieve this.&lt;/p&gt;

&lt;h2&gt;Addressing the Skills Shortage with Automation&lt;/h2&gt;

&lt;p&gt;We have a massive shortage of cyber security professionals in Australia, it’s estimated &lt;a href="https://www.austcyber.com/resources/sector-competitiveness-plan-2019/chapter3" rel="noopener" target="_blank"&gt;&lt;u&gt;we need 18,000 in the next four years&lt;/u&gt;&lt;/a&gt;! For those looking it’s tough to find new hires, it’s also a competitive market so holding onto the skills you have is a challenge, plus they are expensive resources so most organisations can’t afford nearly as many as they need.&lt;/p&gt;

&lt;p&gt;So, the logical approach is to &lt;strong&gt;&lt;em&gt;do more with less&lt;/em&gt;&lt;/strong&gt;, a topic that really resonated with the conference attendees as we discussed how to prioritise their vulnerability management (VM) programs.&lt;/p&gt;

&lt;p&gt;Most of the CISO’s in the audience advised they used one or more VM scanners to identify all the weaknesses in their environment, the challenge came in trying to respond to what was found. The common story being the list gets longer every month and the team can’t keep up, and the work is not that rewarding. It’s a common theme resulting from the impact of covid on the workforce, that unhappy workers tend to find interesting work elsewhere if you can’t satisfy their needs.&lt;/p&gt;

&lt;h2&gt;What’s the Vulnerability Challenge?&lt;/h2&gt;

&lt;p&gt;There are 250k vulnerabilities in the National Vulnerability Database (NVD). What’s actually important is how these can be exploited:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Less than 20% of those are actually weaponised and could be used to breach your organisation.&lt;/li&gt;
	&lt;li&gt;Less than 3% use&amp;nbsp;remote code execution&amp;nbsp;(RCE) and&amp;nbsp;privilege escalation&amp;nbsp;(PE) exploits which are the really dangerous ones, 80% of all breaches use these types of attacks.&lt;/li&gt;
	&lt;li&gt;If ransomware is your biggest fear only 255 CVEs relate to its use, are you sure you know which they are?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So what’s the takeaway from all these facts and figures?&lt;/p&gt;

&lt;p&gt;Well, the problem is if you don’t focus in the right area, you can spend a lot of time, resources and money remediating vulnerabilities that your organisation is very unlikely to be breached by, and you &lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;won’t reduce your attack surface significantly&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/05/risk-based-approach-1.png" /&gt;&lt;/p&gt;

&lt;h2&gt;Apply a Risk-Based Lens to the Problem&lt;/h2&gt;

&lt;p&gt;Risk Based Vulnerability Management (RBVM) was the number two security project for 2021 based on &lt;a href="https://www.gartner.com/smarterwithgartner/gartner-top-security-projects-for-2020-2021" rel="noopener" target="_blank"&gt;&lt;u&gt;Gartner insights&lt;/u&gt;&lt;/a&gt;, with the point being to “focus on vulnerabilities that are actually exploitable”.&lt;/p&gt;

&lt;p&gt;Below I have included some data from a customer we’ve recently worked with.&lt;/p&gt;

&lt;p&gt;The top analysis shows data that comes from their VM scanner, it illustrates that they had over 27,000 &lt;em&gt;Critical&lt;/em&gt; and &lt;em&gt;High&lt;/em&gt; severity items to resolve, an insurmountable task for their security team, the reports to the Senior Executives were worse every month and people were burnt out with no progress being made.&lt;/p&gt;

&lt;p&gt;Compare this to the results when they used a risk-based approach to prioritise based on those that were weaponised, had RCE/PE exploits, were trending, or, had ransomware exposure. The customer could focus on the &lt;em&gt;Critical&lt;/em&gt; and &lt;em&gt;High&lt;/em&gt; &amp;nbsp;6,240 items that were their biggest risk. This meant a huge 75% reduction in their workload, so they could focus on reducing the actual attack surface of the organisation which made a significant impact.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/05/risk-based-approach-2.png" /&gt;&lt;/p&gt;

&lt;h2&gt;Is Ransomware our Biggest Threat?&lt;/h2&gt;

&lt;p&gt;At the CISO conference one of the topics spoken about by the Minister for Home Affairs Karen Andrews and the head of the Australian Cyber Security Centre (ACSC) was the threat ransomware poses. This was detailed in a report available on the ACSC website: &lt;a href="https://www.cyber.gov.au/sites/default/files/2022-02/Advisory_2021_Trends_Show_Increased_Globalized_Threat_of_Ransomware.pdf" rel="noopener" target="_blank" title="2021 Trends show increased globalised threat of Ransomware"&gt;&lt;u&gt;2021 Trends show increased globalised threat of Ransomware&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;If you look at your VM data through this risk-based lens and you can prioritise based on threat, you can gain visibility into exactly where you are vulnerable to ransomware attacks and should focus effort to improve your security posture.&lt;/p&gt;

&lt;p&gt;In this example the security team can provide visibility to their executive team to illustrate the limited exposure they have to ransomware attacks. Of the 10,000 vulnerabilities in the environment across 7,000 devices, only 206 devices and 21 vulnerabilities need attention. It’s also possible to see in green the stats the team achieved to improve protection against ransomware.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2022/05/risk-based-approach-3.png" /&gt;&lt;/p&gt;

&lt;h2&gt;Our Prioritisation Offer to You&lt;/h2&gt;

&lt;p&gt;If you are struggling in a world of too many vulnerabilities and prioritisation with an ability to automate workflows, assignment and service ticket integration doesn’t meet your requirements while your attack surface continues to expand then please get in touch. The only solution isn’t to increase the size of your security team.&lt;/p&gt;

&lt;p&gt;Ivanti has proven with customers worldwide that we can help reduce cyber risks with less manual effort.&lt;/p&gt;

&lt;p&gt;Provide the Ivanti team an output from any vulnerability management tool and within a few hours we can show you how we can prioritise it, giving you three key outcomes:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Reduce your workload by up to 80% by focusing on risk&lt;/li&gt;
	&lt;li&gt;Reduce the cost to deliver your vulnerability management program through risk-based prioritisation&lt;/li&gt;
	&lt;li&gt;Reduce your attack surface faster to reduce the risk of breaches and ransomware infections&lt;/li&gt;
&lt;/ol&gt;
</description><pubDate>Thu, 19 May 2022 09:23:07 Z</pubDate></item><item><guid isPermaLink="false">de71208f-51d5-4913-80b9-8b1fabc544ca</guid><link>https://www.ivanti.com/blog/securing-end-of-life-windows-platforms</link><atom:author><atom:name>James Ley</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-ley</atom:uri></atom:author><category>Security</category><title>Securing End-of-Life Windows Platforms</title><description>&lt;p&gt;&lt;a href="https://www.ivanti.com/" target="_blank"&gt;&lt;img alt="Get expert insights you can't find anywhere else - watch now" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/10/cta-experts.png"&gt;&lt;/a&gt;In the ever-evolving world of technology, Windows platforms are released, heavily adopted, and customized. Business is built around them—and then they go end of life (EOL).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We witnessed it with Windows XP and 2003 in 2014, and as the merry-go-round continues, Windows 7 and 2008 will reach EOL in January 2020.&lt;/p&gt;

&lt;p&gt;When support ends, cyber adversaries will target these platforms. As with Windows XP, &lt;a href="https://nakedsecurity.sophos.com/2019/03/22/microsoft-windows-7-patch-warns-of-coming-patchocalypse/" target="_blank" rel="noopener"&gt;there is buzz in the security media&lt;/a&gt; that attackers are already storing their zero-day attacks and getting malware ready. Attackers will target Windows 7 betting that organizations have unpatched vulnerabilities they can take advantage of.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;What does end of life mean?&lt;/h3&gt;

&lt;p&gt;In three simple statements it means:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;No technical support&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;No software updates&lt;/strong&gt;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;No security updates&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To avoid security risks, Microsoft recommends customers upgrade to Windows 10 and Server 2016.&lt;/p&gt;

&lt;h3&gt;“I need to keep Windows 7 / Server 2008. What can I do?”&lt;/h3&gt;

&lt;p&gt;If you are using Windows 7 Professional or Enterprise or a server 2008 platform, you can purchase extended support from Microsoft through January 2023. &lt;a href="https://www.thurrott.com/windows/199062/microsoft-reveals-windows-7-paid-support-prices" target="_blank" rel="noopener"&gt;This will get you security updates&lt;/a&gt;, but at a cost of between $25 &amp;amp; $50 per device in year 1, doubling each year until 2023.&lt;/p&gt;

&lt;h3&gt;There is no substitute for patching&lt;/h3&gt;

&lt;p&gt;The reality is there is no substitute for patching operating systems. It’s listed in the &lt;a href="https://www.cyber.gov.au/publications/strategies-to-mitigate-cyber-security-incidents" target="_blank" rel="noopener"&gt;Australia Cyber Security Centre (ACSC) top 4 cyber threat mitigation strategies&lt;/a&gt; for a reason. No cyber security professional would recommend not extending support and those key security patches. However, for some organizations it’s just not financially viable.&lt;/p&gt;

&lt;h3&gt;Alternatives or additions to extended support&lt;/h3&gt;

&lt;p&gt;Due to the significant risk and focus for attackers that an out-of-support platform brings, many will look to bolster the security around these devices.&lt;/p&gt;

&lt;p&gt;Delivering a defense-in-depth set of controls to these devices will allow an organization to increase the security posture of these devices and reduce the risk they pose to the wider enterprise.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti is in a unique position to assist our customers with this, delivering the remaining three of the ACSC top 4 controls from the ‘&lt;a href="https://www.ivanti.com/products/security-controls" target="_blank"&gt;Security Controls&lt;/a&gt;’ platform.&lt;/p&gt;

&lt;h3&gt;Application whitelisting&lt;/h3&gt;

&lt;p&gt;Ivanti® &lt;a href="https://products/application-control" target="_blank" rel="noopener"&gt;Application Control&lt;/a&gt; provides a simple-to-deploy, low-management-overhead approach to application whitelisting, enabling organizations to ensure that only IT-approved software and content is ever allowed to run, thus thwarting file-based attacks and many attacks that are file-less originated.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is achieved using Trusted Ownership—a unique approach to application whitelisting employed only by Ivanti. The basic premise is that the Microsoft NTFS owner of a file is checked at run time. If the file was placed on the disk by a trusted user then the file can execute, otherwise it’s blocked by default. This means any software delivered as part of the SOE/Gold build or delivered by SCCM / Ivanti Endpoint Manager can run by default, with no lists to manage.&lt;/p&gt;

&lt;p&gt;This approach provides such a low cost of ownership that customers with fewer than 2,500 managed endpoints tell us they can manage it with a quarter of an FTE. (References available upon request.)&lt;/p&gt;

&lt;h3&gt;Third-party application patching&lt;/h3&gt;

&lt;p&gt;All endpoints have third-party applications installed—some as middleware, some as applications within their own right. Many of these applications contain most of &lt;a href="https://www.ivanti.com/use-cases/extend-configmgr-with-third-party-patching" target="_blank"&gt;the vulnerabilities identified in software&lt;/a&gt;. Reports show that’s up to 86%.&lt;/p&gt;

&lt;p&gt;Ivanti’s patching is market leading and mature, and it features the largest catalog of more than 100 vendors whose patches you can simply click and deploy from our &lt;a href="https://www.ivanti.com/use-cases/manage-my-os-and-third-party-application-patches" target="_blank"&gt;agentless patch platform&lt;/a&gt;. Deploy patches regardless of whether machines are in the network or outside. Automate the deployment and reporting of critical patches within the ACSC-specified guidelines of 48 hours.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Removing administrator privileges&lt;/h3&gt;

&lt;p&gt;There are many reasons why users have administrator privileges. For many organizations, end-of-support platforms have likely been whittled down to only those machines that are stuck there. Ensuring that users only have the minimum privileges they need on these devices—and no more—is key.&lt;/p&gt;

&lt;p&gt;Using Application Control, IT can elevate individual applications, control panel applets, or services as required. By leaving the logged-on session running as a standard user, the lowest level of privileges is available to the exploit in the event the machine is compromised.&lt;/p&gt;

&lt;h3&gt;How Ivanti helped a customer succeed&lt;/h3&gt;

&lt;p&gt;Over the years, Ivanti has assisted many customers who find themselves in the difficult position of needing to manage out-of-support platforms. For example, one customer in the ANZ region was a large government department with a highly sensitive application that ran on Windows XP only.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There was no way to migrate the application off XP prior to the end of support, and the customer wasn’t able to invest in the extended support. Using Ivanti Application Control, they were able to roll out whitelisting to the devices in days, on their own, and secure the devices, with confidence that users couldn’t run any software other than the solitary line-of-business application left on the platform.&lt;/p&gt;

&lt;p&gt;After this project, the customer saw so much value and simplicity in the solution that they rolled it out to the supported production fleet to improve their security and ACSC compliance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/1828/5cf156bee025"&gt;Read the data sheet&lt;/a&gt; on Ivanti Application Control for Windows Servers. You can also &lt;a href="https://www.ivanti.com/lp/security/demos/app-control?from=blog" target="_blank"&gt;request a demo&lt;/a&gt; on our application control capabilities.&amp;nbsp;&lt;/p&gt;</description><pubDate>Tue, 15 Oct 2019 19:38:52 Z</pubDate></item><item><guid isPermaLink="false">454b6f82-c078-41ae-abd3-343d48188670</guid><link>https://www.ivanti.com/blog/are-you-ready-for-the-new-wannacry</link><atom:author><atom:name>James Ley</atom:name><atom:uri>https://www.ivanti.com/blog/authors/james-ley</atom:uri></atom:author><category>Security</category><category>Ivanti News</category><title>Are You Ready for the New WannaCry? You Better Be!</title><description>&lt;p&gt;After the carnage and financial damage caused by &lt;a href="https://www.ivanti.com/blog/breaking-large-scale-cyber-attack" target="_blank"&gt;WannaCry in 2017&lt;/a&gt;, here we go again, and the threat's name is BlueKeep. &lt;a href="https://krebsonsecurity.com/2019/05/microsoft-patches-wormable-flaw-in-windows-xp-7-and-windows-2003/" target="_blank" rel="noopener"&gt;Krebs on Security documented BlueKeep here&lt;/a&gt;. On May 14th,&amp;nbsp;Microsoft released fixes for a critical Remote Code Execution vulnerability, &lt;a href="https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;CVE-2019-0708&lt;/a&gt;, identified and reported to Microsoft by the UK’s National Cyber Security Centre.&lt;/p&gt;

&lt;p&gt;This vulnerability is wormable, meaning it’s a pre-authentication and requires no user interaction and can jump from vulnerable machine to vulnerable machine. It is inherent in the RDP (terminal services) protocol and only affects Windows XP, 7, 2003, 2008 and 2008 r2. Modern operating systems are unaffected.&lt;/p&gt;

&lt;p&gt;This vulnerability was seen as so severe, Microsoft took the uncommon step of releasing patches for unsupported operating systems.&lt;/p&gt;

&lt;p&gt;Unlike&amp;nbsp;WannaCry, this threat is seen as extremely easy to exploit.&amp;nbsp;It took a leaked NSA tool to exploit the WannaCry vulnerability, whereas the fear with&amp;nbsp;this one is that it will be much easier to take advantage of.&lt;/p&gt;

&lt;p&gt;With a patch now available you can bet there are cyber adversaries out there reverse engineering the patch while I write this blog, getting ready to exploit organizations and individuals alike.&lt;/p&gt;

&lt;p&gt;Globally there are around 35% of Windows workstations running on affected Operating Systems.&lt;/p&gt;

&lt;p&gt;&lt;img alt="desktop windows market share worldwide - april 2019" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/05/screen-shot-2019-05-17-at-1.33.16-pm.png"&gt;&lt;/p&gt;

&lt;p&gt;It’s much harder to ascertain from a server OS standpoint what the exposure size is, as most servers are not internet-facing to get these stats. If the customers I speak to on a daily basis&amp;nbsp;are anything to go by, there are still many pockets of these 2003 and 2008/r2 servers around.&lt;/p&gt;

&lt;p&gt;Many of these older servers are Citrix server-based computing environments which will all be running RDS. I was listening to my favorite cyber security podcast last week (&lt;a href="https://darknetdiaries.com/" target="_blank" rel="noopener"&gt;Darknet Diaries&lt;/a&gt;), and the host was talking to a penetration tester who did internal pen tests. He said when he is in an environment and he finds Citrix, that becomes his primary target. It’s a hub of applications, tools and privileges. If you have one of these legacy environments, make sure it’s patched!&lt;/p&gt;

&lt;p&gt;A &lt;a href="https://www.rapid7.com/blog/post/2017/08/09/remote-desktop-protocol-exposure/" target="_blank" rel="noopener"&gt;Rapid7&lt;/a&gt; blog showed how internet scanning engine &lt;a href="https://www.binaryedge.io/" target="_blank" rel="noopener"&gt;Binary Edge&lt;/a&gt; identified 16 million endpoints publicly available on port 3389 and 3388 typically reserved for RDP. With 67,338 endpoints internet facing for RDP as of July 2017. It’s not clear what OS these exposed servers were running.&lt;/p&gt;

&lt;p&gt;So what’s the answer? You better get patching, ASAP!&lt;/p&gt;

&lt;p&gt;With the latest versions of MS SCCM not supporting Windows XP and Server 2003, the job is going to be more difficult.&amp;nbsp;Does this mean manual patching? Not necessarily.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/products/security-controls" target="_blank"&gt;Ivanti Security Controls&lt;/a&gt; provides our customers the ability to patch both XP and Server 2003, in an automated approach with complete visibility to status. Know if you are exposed rather than waiting on manual analysis and reports you don’t trust 100%.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/network-security" target="_blank"&gt;&lt;img alt="Protect yourself from the next wannacry" src="https://static.ivanti.com/sites/marketing/media/images/blog/2019/05/wannacryfinal.png"&gt;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Wed, 15 May 2019 18:30:01 Z</pubDate></item></channel></rss>