<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/blog/authors/srinivas-mukkamala/rss" /><link>https://www.ivanti.com/blog/authors/srinivas-mukkamala</link><item><guid isPermaLink="false">30d52c64-b0d8-4959-9a69-8aff18488fad</guid><link>https://www.ivanti.com/blog/security-by-default-the-crucial-complement-to-secure-by-design</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>Security by Default: The Crucial Complement to Secure by Design</title><description>&lt;p&gt;Legacy cybersecurity systems – many designed over a decade ago – fail to account for the new breed of attacker capabilities and vulnerabilities – nor for the reliance on human configuration that is the Achilles heel of so much software.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This new reality is being answered with the software development concept called security by default, a necessary complement to the principles of &lt;a href="https://www.cisa.gov/securebydesign/pledge" rel="noopener" target="_blank"&gt;Secure by Design&lt;/a&gt; set forth by the U.S. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA).&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Secure by Design principles stress embedded security throughout software design and development. Security by default ensures a zero-day product is inherently secure out of the box. No complex setup is needed because core security features like secure logging and authorization are pre-configured.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Threats are evolving – and accelerating&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Until recently, most systems had a limited "blast radius." Protected by firewalls, they were contained, so access was restricted to a select few within an organization. Attackers lacked an open playing field they could crawl in search of weaknesses. They couldn't automate their assaults, and the entire attack process – finding a vulnerability, weaponizing it by crafting an exploit and deploying the weaponized attack – took weeks at least, and often months.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This limited not only the speed of attacks but also their scale. Attackers had to target organizations one by one, figuring out ways to bypass specific controls. The overall rate of attacks was low, and even when they did occur, the impact was relatively contained due to the time and effort attackers had to invest.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Related: &lt;a href="https://www.ivanti.com/blog/the-8-best-practices-for-reducing-your-organization-s-attack-surface"&gt;8&amp;nbsp;Attack Surface Reduction Best Practices for Organizations&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;When we talk about “an evolving cyber threat landscape,” this is nearly an understatement, because natural or even technical evolution has never been this rapid. In only a few years, it has morphed into a digital Thunderdome, an arena that imperils the poorly protected like never before.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is because attackers have been able to capitalize on three key developments:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Today’s attackers can quickly weaponize vulnerabilities, and artificial intelligence tools are making that even easier. Gone are the days of lengthy disclosure windows. Automated scanning tools and exploit kits readily available on the dark web let even less-technical attackers get in on the malware game. Zero-day attacks are a growing concern as attackers become more agile at exploiting vulnerabilities before a patch exists.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Cloud adoption has created a broader attack surface as distributed cloud infrastructure makes it difficult to secure and monitor data. The shared security responsibility model between cloud providers and users can lead to vulnerabilities if misconfigured or not fully understood. Additionally, cloud applications often rely on APIs for communication, which can introduce vulnerabilities if not properly secured.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Traditional security measures like firewalls and antivirus aren't keeping pace. Firewalls can be bypassed through social engineering even as antivirus struggles to detect brand new zero-day threats. The perimeter-based security approach is outdated in the cloud era, where Secure by Design principles need to be implemented throughout the entire IT infrastructure.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Bad guys are ready to probe for weak points or launch attacks the moment a product gets activated. So, that product must have robust, zero-day defenses in place the instant it is turned on and connected to an organization’s network.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Related: &lt;a href="https://www.ivanti.com/blog/secure-by-design-principles-are-more-important-than-ever"&gt;Secure by Design Principles Are More Important Than Ever&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;The three pillars of security by default&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Proper execution of security by default rests on three fundamental pillars.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Shift-left security&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/glossary/shift-left"&gt;Shift-left&lt;/a&gt; focuses on catching vulnerabilities early in the development process. Developers need to write secure code, avoiding common pitfalls identified in resources like the OWASP Top 10 (web application security vulnerabilities) and CWE Top 25 (common software weaknesses).&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;An analogy is preventive medicine, where wellness practices and inoculation can protect a person from illness. By focusing on secure coding practices from the start, developers are building immunity and resilience right into the software.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Enforcing secure configurations&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;When human beings configure their new software, hackers celebrate. To eliminate misconfiguration errors, software providers must enforce secure configurations by default. This includes multi-factor authentication (MFA) or single sign-on (SSO) and avoiding hard-coded credentials (passwords or tokens) or default configurations that have vulnerabilities already known to attackers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Enforcing secure configurations ensures consistent security across all deployments, regardless of user experience or technical expertise. It also simplifies user experience, since they don’t have to make configuration decisions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Securing the software supply chain&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Like automative and aerospace manufacturing, modern software development has become an assembly line – one that relies heavily on third-party libraries and open-source code. Under security by default, developers need to pay strict attention to the security of these components so they don't introduce vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Related: &lt;a href="https://www.ivanti.com/blog/the-secure-by-design-pledge-a-commitment-to-creating-a-safer-digital-future"&gt;The Secure by Design Pledge: A Commitment to Creating a Safer Digital Future&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Measuring security by default&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Today, a provider can take advantage of instrumentation and telemetry to monitor the performance of security by default features. If the product is on-premises, enabling telemetry will involve punching holes in a firewall for the data to leave the user's network. If it’s in the cloud, it's easier to allow telemetry to flow back to the provider.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In either situation, it’s a matter of mutual consent: The software user must enable the default telemetry so the provider can look at the software's behavior and see if its inbuilt security controls are being implemented. Fortunately, this also means the user does not have to intervene to enable security features. A provider can do so remotely if it has customer consent.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Getting ahead of evolving threats&lt;/h2&gt;

&lt;p&gt;The best-intentioned, hardest-working cybersecurity professionals are still at the mercy of the data and insights they have in hand. For instance, traditional vulnerability lists like the &lt;a href="https://owasp.org/www-project-top-ten/" rel="noopener" target="_blank"&gt;OWASP Top 10&lt;/a&gt; and &lt;a href="https://cwe.mitre.org/top25/index.html" rel="noopener" target="_blank"&gt;CWE Top 25&lt;/a&gt; are key to security awareness but have limitations:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Updates to the lists still leave a window of vulnerability between discovery and mitigation. Attackers exploit this gap by targeting "outlier" vulnerabilities that are not yet listed.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Traditional lists focus on known vulnerabilities, leaving organizations susceptible to "known unknowns” – weaknesses with potential for exploitation but not yet identified.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;nbsp;That said, AI and machine learning hold the promise of revolutionizing security by default by closing these gaps:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Machine learning algorithms can analyze vast amounts of security data to identify patterns and predict potential vulnerabilities, including those not yet on traditional lists.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;By analyzing exploit trends and software behavior, machine learning can identify the “known unknown” weaknesses with a higher likelihood of being exploited, even if they are still undocumented.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Adding AI into SDLC&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;AI and machine learning can also transfigure how security by default principles are incorporated into software development cycles:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&amp;nbsp;&lt;strong&gt;Automated vulnerability detection:&lt;/strong&gt; AI tools can continuously scan code for vulnerabilities, both known and unknown, so they can be addressed early in an SDLC.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Proactive security modeling:&lt;/strong&gt; By analyzing attack patterns, AI can predict threats; this allows proactive security modeling to build software with baked-in defenses against those threats.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Intelligent developer assistance:&lt;/strong&gt; AI can analyze code and make real-time suggestions about secure coding practices to development teams.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Security by default via self-healing software&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;One goal for developers concerned with security by default is the creation of software with the innate ability to proactively self-identify vulnerabilities and rectify them. This concept is inspired by &lt;a href="https://en.wikipedia.org/wiki/Genetic_algorithm" rel="noopener" target="_blank"&gt;genetic algorithms&lt;/a&gt; used in manufacturing let systems self-optimize and improve themselves over time.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This will transform “security by default” from a static concept to a dynamic, self-monitored, self-healing capability that’s built into enterprise software. That will give it the ability to rectify its own vulnerabilities, thwart threats and even report new attacks to its developers.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Related: &lt;a href="https://www.ivanti.com/webinars/2024/practical-demo-protect-all-endpoints-with-secure-uem-countermeasures"&gt;Practical Demo: Protect all endpoints with secure UEM countermeasures&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;h2&gt;Steps in the right direction&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Not too long ago, I &lt;a href="https://www.ivanti.com/blog/it-s-time-for-digital-privacy-and-safety-to-be-a-government-priority"&gt;wrote&lt;/a&gt; about how there needed to be a “private/public partnership in which industry and government come together to solve the digital security problem.” The creation of Secure by Design principles and the efforts of CISA and industry leaders to advance them is a big step forward in mounting just such an urgently needed collaborative defense against cyber threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It’s still up to individual software providers and developers to put these measures into action, though. Following security by default practices plays a vital part in developing and delivering more secure software and gaining the high ground in the cybersecurity battle.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 13 Sep 2024 12:00:00 Z</pubDate></item><item><guid isPermaLink="false">0b222c5e-5963-47e1-97f6-0bc1c36d69c9</guid><link>https://www.ivanti.com/blog/enhancing-cybersecurity-for-federal-and-dod-customers-ivanti-s-fedramp-certified-solutions-and-commitment-to-il-5-and-cmmc-certifications</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>Enhancing Cybersecurity for Federal and DoD Customers: Ivanti's FedRAMP Certified Solutions and Commitment to IL 5 and CMMC Certifications</title><description>&lt;p&gt;At Ivanti, we support the mission of our Federal and DoD customers and join with our warfighters in defending against cybersecurity threats and nation-state sponsored cyber-attacks.&lt;/p&gt;

&lt;p&gt;Ivanti offers FedRAMP certified solutions for IT Service Management and Unified Endpoint Management, and is also a leader in on-premise, disconnected and air-gapped network solutions. The Ivanti Enterprise Mobility Management solution (originally MobileIron MDM) was one of the first to be certified under the NIAP/Common Criteria Mobile Device Management Protection Profile Version 1 (NIAP MDMPP v1), has been continually recertified under each of the updated versions, and remains one of the only MDM solutions with a CSfC certification for use on classified programs.&lt;/p&gt;

&lt;p&gt;In recent years the escalation of the threat from malicious actors and nation-state sponsored cyber criminals has resulted in the need for Ivanti to enhance the security of our solutions and cloud platforms. To that end, Ivanti is committed to meeting the US Department of Defense’s requirements for an Impact Level 5 (IL 5) cloud platform for our IT Service Management and our Unified Endpoint Management solutions. Work is ongoing to achieve IL 5 and CMMC certifications for these and other future solutions.&lt;/p&gt;
</description><pubDate>Fri, 16 Feb 2024 23:30:22 Z</pubDate></item><item><guid isPermaLink="false">97a33652-b05e-489d-8401-b0719eb276e7</guid><link>https://www.ivanti.com/blog/the-latest-ransomware-stats-are-in-and-it-s-not-good-news</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>The Latest Ransomware Stats Are In and It’s Not Good News.</title><description>&lt;p&gt;Out of 10&amp;nbsp;key metrics tracked quarterly to establish the state of ransomware activity, only one metric stayed static from Q1 to Q3 2022. The other nine&amp;nbsp;all&amp;nbsp;worsened.&lt;/p&gt;

&lt;p&gt;That’s an alarming trend, especially given that many business leaders hoped to see ransomware activity taper off after a historic surge during the peak of the pandemic.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti, together with Cyber Security Works and Cyware, collaborated on the just-released report. To inform the report, ransomware data was meticulously collected from multiple data sources known for their accuracy and is continuously updated by the Cyber Security Works and Securin research teams.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The full report is available and&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;worth a read&lt;/a&gt;. Here are a few important takeaways:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;The pandemic surge is real&lt;/strong&gt;&amp;nbsp;...&amp;nbsp;Since 2019, there has been a 466% growth in the number of vulnerabilities associated with ransomware.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;…&amp;nbsp;&lt;strong&gt;and it’s not over&lt;/strong&gt;.&amp;nbsp;A total of 13 new vulnerabilities have become exploitable by ransomware threat actors in the past six months, and the vast majority of those – 11 in total, are from Q3 alone.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;It’s critical&lt;/strong&gt;.&amp;nbsp;10 out of the 13 newly associated vulnerabilities have a “critical” severity rating.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Popular scanners aren’t cutting it&lt;/strong&gt;&amp;nbsp;… Popular scanners, including Nessus, Nexus and Qualys, are not filtering 18 ransomware vulnerabilities.&lt;/li&gt;
	&lt;li&gt;…&amp;nbsp;&lt;strong&gt;and the CISA KEV Catalog is incomplete&lt;/strong&gt;.&amp;nbsp;The Known Exploited Vulnerabilities (KEV) catalog from CISA is missing at least 124 ransomware vulnerabilities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Three industries are the hardest hit&lt;/strong&gt;.&amp;nbsp;Healthcare, energy and critical manufacturing are at particular risk from 16 ransomware vulnerabilities exploited by some of the most notorious ransomware operators.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Ransomware needs human interaction and phishing as the only attack vector is a myth. Ransomware attack vectors have&amp;nbsp;&lt;strong&gt;evolved and are now targeting remote access services&lt;/strong&gt;, software weaknesses and cloud applications.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;57 vulnerabilities&lt;/strong&gt;&amp;nbsp;can facilitate a&amp;nbsp;MITRE ATT&amp;amp;CK&amp;nbsp;complete kill chain from initial access to exfiltration, making them extremely dangerous as ransomware attackers could use them to take down their victims.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;New ransomware families are emerging constantly&lt;/strong&gt;.&amp;nbsp;Several new ransomware families have emerged over the last six months, making it essentially impossible to keep pace without a comprehensive, proactive and risk-based strategy.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The full report contains essential details, including information on the new ransomware families; affected vendors and products; key trends; and more intelligent insights. Ransomware operators are fully up to speed on what’s happening. That means you should be, too.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Thu, 20 Oct 2022 16:40:51 Z</pubDate></item><item><guid isPermaLink="false">966da25d-8af3-4503-8100-ff6f9864b305</guid><link>https://www.ivanti.com/blog/it-s-cybersecurity-awareness-month-here-s-what-you-need-to-know</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>It’s Cybersecurity Awareness Month! Here’s What You Need to Know</title><description>&lt;p&gt;Okay, I’ll admit it – I probably get more excited for&amp;nbsp;Cybersecurity Awareness Month&amp;nbsp;than most people. It’s a professional hazard. It has been 18 years since the first Cybersecurity Awareness Month, but&amp;nbsp;this one feels particularly important.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For starters, the Cybersecurity and Infrastructure Security Agency (CISA) – an operational component of the Department of Homeland Security (DHS) – is&amp;nbsp;steering towards a proactive and risk-based approach to cybersecurity&amp;nbsp;with DHS KEVs and binding orders.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Plus, the Securities &amp;amp; Exchange Commission (SEC) is&amp;nbsp;&lt;a href="https://www.cisa.gov/resources-tools/programs/systemic-cyber-risk-reduction" rel="noopener" target="_blank"&gt;actively enforcing cybersecurity laws&lt;/a&gt;&amp;nbsp;and&amp;nbsp;contemplating bringing a cyber expert on board.&lt;/p&gt;

&lt;p&gt;In addition, we’re at an inflection point. After multiple years of scramble and survival mode, enterprises are finally getting their proverbial feet under them and are focusing on comprehensive strategies for the next phase.&lt;/p&gt;

&lt;p&gt;The world is moving from reactive to proactive:&amp;nbsp;From fear to risk management. From tedious manual operations to wisely designed automation. From “try to keep up” to “move forward with intention.”&lt;/p&gt;

&lt;p&gt;And perhaps, we are getting back to the fundamentals of cybersecurity rather than chasing the shiniest possible objects.&lt;/p&gt;

&lt;p&gt;It’s an exciting time, and I’m thrilled to be part of it.&lt;/p&gt;

&lt;p&gt;I want you to seize the moment, so I’m kicking off Cybersecurity Awareness Month with a highlight reel of some ideas, resources and activities we have going on this month at Ivanti. Here’s what you can do now:&lt;/p&gt;

&lt;h2&gt;See yourself in cyber&lt;/h2&gt;

&lt;p&gt;That’s&amp;nbsp;&lt;a href="https://www.cisa.gov/cybersecurity-awareness-month" rel="noopener" target="_blank"&gt;the theme&lt;/a&gt;&amp;nbsp;of this Cybersecurity Awareness Month. I love it because it reminds us we&amp;nbsp;all&amp;nbsp;can play a role in shoring up the cybersecurity posture of our organization – and protecting ourselves, too.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Even though cybersecurity has a lot to do with technology, there’s a deeply human element. Every individual should know how to protect against phishing attacks, when and how to update devices and software and how their everyday activities fit into the organization’s cybersecurity posture.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Follow us on social and stay tuned for our CISO video series&lt;/h2&gt;

&lt;p&gt;Ivanti is producing an educational video series to highlight the role of the CISO. This series is designed to create awareness and excitement – especially within the younger generation –about STEM fields and, specifically, the importance of a CISO.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We’ll be interviewing&amp;nbsp;&lt;a href="https://www.ivanti.com/company/press-releases/2021/ivanti-reinforces-commitment-to-customer-security-with-ciso-advisory-board"&gt;members of our CISO Advisory Board&lt;/a&gt;&amp;nbsp;and sharing the videos on social – be sure to follow us on&amp;nbsp;&lt;a href="https://www.linkedin.com/authwall?trk=ripf&amp;amp;trkInfo=AQGQXnuOP6uiTwAAAYOfoe2Id086-hN7_mmm6F0tZQ4J-gw-jEsLziQvx07kX76V-q4Cr4q5xYldlxbTKAGpJVIWnSQoDaskjvQbdhLYwLnT_rNuLa6vfQUxtTNnFECVx7T_q50=&amp;amp;original_referer=https://www.google.com/&amp;amp;sessionRedirect=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fivanti" rel="noopener" target="_blank"&gt;LinkedIn&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://twitter.com/goivanti" rel="noopener" target="_blank"&gt;Twitter&lt;/a&gt;&amp;nbsp;if you don’t already!&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Focus on the first principles of cybersecurity&lt;/h2&gt;

&lt;p&gt;Speaking of getting back to basics, it’s a great time to review the NSA's “&lt;a href="https://users.cs.jmu.edu/tjadenbc/Bootcamp/0-GenCyber-First-Principles.pdf" rel="noopener" target="_blank"&gt;first principles of cybersecurity&lt;/a&gt;.”&amp;nbsp;These guidelines are intended to not just help&amp;nbsp;prevent&amp;nbsp;a breach but lower the probability of a successful cyberattack.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The first principles include:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Domain separation.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Process isolation.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Resource encapsulation.&lt;/li&gt;
	&lt;li&gt;Least privilege.&lt;/li&gt;
	&lt;li&gt;Layering.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Abstraction.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Data hiding.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Modularity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Simplicity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Minimization.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Get ready for the Q2/Q3 Ransomware Index Report&lt;/h2&gt;

&lt;p&gt;This report, which we regularly conduct with Cyber Security Works and Cyware, is always highly anticipated and gets lots of attention, so we’re looking forward to the release of the next one. This next report will look at Q2/Q3 trends in ransomware.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The report will also detail:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;New vulnerabilities tied to ransomware.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;APT groups associated with ransomware.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;The most active ransomware families.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;New weakness categories related to ransomware.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Can’t wait for the Q2/Q3 report?&amp;nbsp;Check out the&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;Q1 report&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Register for our Patch Tuesday webinar&lt;/h2&gt;

&lt;p&gt;As we do every month, we’ll recap the Microsoft and third-party security patches released on Patch Tuesday (the second Tuesday of the month; in this case, Oct. 11).&amp;nbsp;&lt;a href="https://www.ivanti.com/lp/webinar-series/patch-tuesday"&gt;Register&lt;/a&gt;&amp;nbsp;to hear&amp;nbsp;discussions on things to watch out for, products to test adequately and which patches should be the highest priority to roll out.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Listen to the Everywhere Workplace podcast&lt;/h2&gt;

&lt;p&gt;Our podcast contains information to help you thrive in – not just survive – the Everywhere Workplace.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/podcasts/ivanti-security-insights"&gt;Check out our latest podcast episodes&lt;/a&gt;&amp;nbsp;for tips on how to make managing your flexible workforce easy and secure! We recently sat down with Steve Brasen, Managing Research Director at EMA, to discuss strengthening security with digital employee experience.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And to learn about the changing world of technology and cybersecurity,&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/podcasts/ivanti-security-insights"&gt;tune into&lt;/a&gt;&amp;nbsp;our Ivanti Security Insights Podcast.&lt;/p&gt;

&lt;p&gt;That’s a lot – and there’s more to come. Here’s to moving forward with intention, strategy and better cybersecurity posture than ever before.&lt;/p&gt;
</description><pubDate>Tue, 04 Oct 2022 13:37:45 Z</pubDate></item><item><guid isPermaLink="false">cae33dfa-b6b6-4724-af1d-f9c61d819998</guid><link>https://www.ivanti.com/blog/it-s-time-for-digital-privacy-and-safety-to-be-a-government-priority</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>It’s Time for Digital Privacy and Safety to Be a Government Priority</title><description>&lt;p&gt;In the US, a massive percentage of the spend on cybersecurity is spent &lt;a href="https://fedscoop.com/white-house-allocates-9-8b-to-cybersecurity-in-2022-budget-request/" rel="noopener" target="_blank"&gt;securing the federal government&lt;/a&gt; itself and on &lt;a href="https://cybersecurityventures.com/cybersecurity-spending-2021-2025/" rel="noopener" target="_blank"&gt;securing the largest enterprises&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;That’s an important investment.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It’s also wildly unbalanced, and has terrifying implications for all of us.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Digital privacy and safety are becoming a new economic gulf, widening the distance between those who have the resources to secure themselves and their companies, and those who don’t.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Why should everyone care? Because the fallout of this imbalance affects everyone, directly or indirectly.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Small and medium-sized businesses can’t afford to be compromised&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Utilities are a prime example of this problem. Different municipalities have their own utilities. Only the largest and most well-funded municipalities have robust IT and security departments. And &lt;a href="https://www.shrm.org/resourcesandtools/hr-topics/technology/pages/it-workers-will-be-hard-find-keep-2022.aspx" rel="noopener" target="_blank"&gt;IT/security is one of the hardest-hit sectors of the Great Resignation&lt;/a&gt;, meaning that even municipalities with the resources to hire a strong IT department struggle to find workers. In the case of a breach, there’s no way they can manage reactive forensics, let alone be proactive enough to keep up with every conceivable threat. It’s not just personally identifiable information (PII) that is vulnerable if a utility gets victimized. Think utilities don’t matter? Try having your water supply compromised.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Agriculture tech is another example. Aside from the very largest, subsidized producers, agriculture operations in the US largely operate on razor-thin margins. Not long ago, &lt;a href="https://www.nytimes.com/2021/06/01/business/meat-plant-cyberattack-jbs.html" rel="noopener" target="_blank"&gt;a ransomware attack took down a meat processing company&lt;/a&gt;. The entire system felt the impact. Now think of the thousands of family-owned and cooperative farms and processors. They certainly don’t have an entire IT/security team. They might be lucky to have one IT employee. Many of them have none.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We don’t want our utility providers or agriculture system to have to play Whac-A-Mole with cybersecurity threats. We count on these industries to keep us maintaining a basic standard of living. And there are hundreds more examples where these came from.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;It’s not just business, it’s personal&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Digital privacy and safety are also a point of privilege at the individual level. Some people have the resources to prevent victimization or recover from being victimized. Many others don’t. There has been more talk recently of &lt;a href="https://www.washingtonpost.com/news/posteverything/wp/2018/01/25/why-it-costs-so-much-to-be-poor-in-america/" rel="noopener" target="_blank"&gt;how &lt;em&gt;expensive&lt;/em&gt; it is to be low-income in the US&lt;/a&gt;. This is yet another way that lack of resources can be devastatingly costly.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the US, if you don’t have sufficient resources to buy food, you can apply for assistance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It’s by no means a perfect system, but it’s there.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If you don’t have sufficient resources to pay for medical care, you can apply for assistance. It’s by no means a perfect system, but it’s there.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If you don’t have sufficient resources to protect your digital security, you’re essentially out of luck. That’s not to say that digital security is as important as food or health care – it certainly isn’t – but I assert that it is a basic right, and it should be treated as such.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What’s the solution?&amp;nbsp;&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ideally, the government would allocate more funds to digital security for individuals, families and small/medium-sized businesses. And yet, it’s not that simple. To be effective, it should be a private/public partnership in which industry and government come together to solve the digital security problem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;We need to start with local educational institutions and emphasize the need for cybersecurity professionals. We need to treat digital security as a noble profession that keeps people and institutions safe and economically stable. We need to educate students and entrepreneurs across disciplines and industries about the importance of prioritizing digital security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The government can’t do this alone. It needs to be a cultural shift. Right now, cyberthreat actors are &lt;em&gt;far&lt;/em&gt; ahead of most of the rest of the world. If we don’t start taking this seriously and treating it like a fundamental element of security at the government, industry, and individual level, we are just making threat actors’ jobs even easier. We need to act before it’s too late.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Fri, 10 Jun 2022 16:18:49 Z</pubDate></item><item><guid isPermaLink="false">6e30bec2-d3a2-4a0d-90d2-5275220588f7</guid><link>https://www.ivanti.com/blog/new-2022-report-alarming-ransomware-trend-shows-no-sign-of-reversing</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>New 2022 Report: Alarming Ransomware Trend Shows No Sign of Reversing</title><description>&lt;p&gt;It’s no secret that ransomware threats skyrocketed – in both volume and boldness – during the pandemic. Threat actors capitalized on the sudden transition to remote work and the resulting lapses in security.&lt;/p&gt;

&lt;p&gt;Now that the working world is beginning to settle into &lt;a href="https://www.ivanti.com/blog/no-pants-no-problem-employees-report-more-work-yet-more-satisfaction-in-the-everywhere-workplace" target="_blank"&gt;a permanent Everywhere Workplace&lt;/a&gt;, you might think the ransomware trend would begin to reverse.&lt;/p&gt;

&lt;p&gt;Not so, according to &lt;a href="https://www.ivanti.com/resources/library?eol=rl" rel="noopener" target="_blank"&gt;a new report from Ivanti&lt;/a&gt;. The report details ransomware trends from Q1 2022, and the findings are bleak.&lt;/p&gt;

&lt;p&gt;Here are a few highlights (or, rather, &lt;em&gt;low&lt;/em&gt;lights):&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Since publication of the year-end 2021 report, Ivanti’s analysis shows a strong &lt;strong&gt;7.6% increase in the number of ransomware-affiliated vulnerabilities&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;At the time the report was published, there had been &lt;strong&gt;22 new vulnerabilities&lt;/strong&gt; associated with ransomware just since January 2022. That takes the total number from 288 to 310.&lt;/li&gt;
	&lt;li&gt;Of the vulnerabilities tied to ransomware, at least &lt;strong&gt;11 are undetected by popular &lt;a href="https://www.ivanti.com/blog/9-types-of-phishing-and-ransomware-attacks-and-how-to-identify-them" target="_blank"&gt;scanners&lt;/a&gt;&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;27 new vulnerabilities&lt;/strong&gt; were added to Conti’s ransomware arsenal this quarter – a ransomware gang that expressed &lt;a href="https://www.reuters.com/technology/russia-based-ransomware-group-conti-issues-warning-kremlin-foes-2022-02-25/" rel="noopener" target="_blank"&gt;its support of the Russian invasion&lt;/a&gt; of Ukraine this past spring.&lt;/li&gt;
	&lt;li&gt;Three new APT groups (&lt;strong&gt;Exotic Lily, APT 35 and DEV-0401&lt;/strong&gt;) have started leveraging ransomware to attack targets.&lt;/li&gt;
	&lt;li&gt;Four new ransomware families (&lt;strong&gt;AvosLocker, Karma, BlackCat and Night Sky&lt;/strong&gt;) became active in Q1.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The takeaway: ransomware threats are emerging far faster than any IT department can stay on top of manually, even if that department is fully staffed and working around the clock. And, even when technology like a scanners is involved, threats are still going undetected.&lt;/p&gt;

&lt;p&gt;As we’ve said before, those of us defending against attacks need to be right every single time;&amp;nbsp;attackers only need to be right once. Current security gaps are more than sufficient to let threat actors wreak havoc.&lt;/p&gt;

&lt;p&gt;So, what can security leaders practically do in the face of this increasing threat? Among other solutions, you can consider &lt;a href="https://www.ivanti.com/blog/automated-patch-management-and-team-swarming-are-key-security-practices" target="_blank"&gt;automating cybersecurity protocols&lt;/a&gt; as part of a &lt;a href="https://www.ivanti.com/products/risk-based-vulnerability-management"&gt;comprehensive, risk-based vulnerability management program&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The &lt;a href="https://www.ivanti.com/blog/err-human-making-case-automation" target="_blank"&gt;weakest link of any security protocol&lt;/a&gt; is the human element, after all. The less you require of your end users and IT or security teams to implement security-centric tasks, the less chance you introduce error into an already delicate balance... and the less chance you have of burning out your security team completely.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;To read more about current threats and trends, download the full 2022 &lt;a href="https://www.ivanti.com/resources/library?eol=rl" rel="noopener" target="_blank"&gt;Q1 Ransomware Index Report&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;</description><pubDate>Wed, 18 May 2022 07:11:00 Z</pubDate></item><item><guid isPermaLink="false">7f5a3153-21f4-4db8-9d21-0a02087ca19f</guid><link>https://www.ivanti.com/blog/who-is-most-vulnerable-to-ransomware-attacks-new-report-reveals-latest-trends</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>Who is Most Vulnerable to Ransomware Attacks? New Report Reveals Latest Trends.</title><description>&lt;p&gt;No one will be surprised to hear that ransomware is, once again, on the rise. The last two years have seen a stratospheric increase in both the frequency and sophistication of attacks. In a just-released report from Ivanti,&amp;nbsp;Cyber Security Works and&amp;nbsp;Cyware,&amp;nbsp;2021 closed out with alarming statistics including a 29% increase in CVEs associated with ransomware, and a 26% increase in ransomware families compared to the previous year. The report identified 32 new ransomware families in 2021, bringing the total to 157 and representing a 26% increase over 2020.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And yet, it’s not just simply a question of&amp;nbsp;how many CVEs and ransomware families we’re seeing. It’s also how they’re being leveraged, and who is most at risk.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti’s report reveals several patterns that businesses need to be aware of&amp;nbsp;in order to&amp;nbsp;maximize defenses against&amp;nbsp;threats.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Pattern #1: Unpatched vulnerabilities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;While threat actors are sophisticated, they’re also opportunistic. Unpatched vulnerabilities remain the most prominent attack vectors exploited by ransomware groups. Of the 65 new vulnerabilities identified by&amp;nbsp;our&amp;nbsp;analysis,&amp;nbsp;more than one-third&amp;nbsp;were actively trending on the dark web and repeatedly exploited. More than half of the 223 older vulnerabilities are still being targeted as well. The lesson: organizations need to prioritize and patch weaponized vulnerabilities based on what’s being targeted, whether those vulnerabilities are new or old. Since manually keeping up with patching every vulnerability isn’t realistic, it’s critical to embrace automated, risk-based patch intelligence so the highest-priority vulnerabilities get the attention they need.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Pattern #2: Exploitation of zero-day vulnerabilities&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Has your organization been waiting to act until CVEs are added to the National Vulnerability Database?&amp;nbsp;If so, unfortunately, you’re already behind. Threat actors are acting so quickly that they’ve been repeatedly leveraging zero-day vulnerabilities that haven’t even made it to the database yet. This dangerous trend highlights the need for solutions that can identify and remediate even zero-day vulnerabilities – and the need for vendors to be agile and transparent in disclosing vulnerabilities and releasing priority-based patches.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Pattern #3: Supply chain attacks&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Ransomware groups are increasingly targeting supply chain networks to inflict major damage and cause widespread chaos. Just one compromise in the supply chain can snowball into the hijacking of complete system distributions across hundreds of victim networks. Last year, threat actors compromised supply chain networks via third-party applications, vendor-specific products, and open-source libraries.&amp;nbsp;The takeaway: If you’re involved in supply chain, additional vigilance and, again, risk-based, prioritized patching is essential.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Pattern #4: Ransomware-as-a-Service&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Ransomware-as-a-Service sounds like a parody, but it’s a real thing – and it’s on the rise. This business model involves ransomware developers offering their services, variants,&amp;nbsp;kits&amp;nbsp;or code to other malicious actors in return for payment. The sharing of ransomware services accelerates the spread of threats – and makes it more difficult to track down the threat’s origin.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;If this sounds like a lot of unpleasant news, that’s because it&amp;nbsp;is&amp;nbsp;a lot of unpleasant news. The upside: threat actors are getting bolder, but countermeasures are also advancing. A proactive, risk-based approach is becoming the must-have security posture for businesses of all sizes across a wide range of industries. Even better:&amp;nbsp;automated patch intelligence means risk-based prioritization can happen even with the&amp;nbsp;significant&amp;nbsp;personnel shortage&amp;nbsp;facing IT right now. Threat actors aren’t letting up, and we’re going to continue to see a rise in attacks. While that’s inevitable, it’s&amp;nbsp;not&amp;nbsp;inevitable that businesses continue to fall victim at the rates we’re witnessing now. The solution: prioritize. Patch. Automate. And do it&amp;nbsp;now.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;To read the&amp;nbsp;latest&amp;nbsp;Ransomware report in full,&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;click here&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To learn more about&amp;nbsp;Ivanti Neurons for Patch Intelligence,&amp;nbsp;&lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;click here.&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Wed, 26 Jan 2022 13:01:17 Z</pubDate></item><item><guid isPermaLink="false">50360b1d-dc74-4486-9472-a3b78edd4ef3</guid><link>https://www.ivanti.com/blog/new-report-ransomware-continues-to-rise-here-s-how-to-get-ahead-of-it</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>New report: Ransomware continues to rise. Here’s how to get ahead of it.</title><description>&lt;p&gt;Ransomware experienced a stunning surge in prevalence and sophistication throughout the pandemic. Threat actors capitalized on a frequently shaky transition to a remote, digital business landscape. With so many businesses prioritizing basic functionality over proactive security, vulnerabilities have been unprecedented – and very much exploited.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Case in point: In a recent survey, Ivanti found that well over half of respondents (58%) reported that their businesses had been the victim of a ransomware attack in the last year alone. A significant percentage of those respondents said that the attack took weeks, not simply days or hours, to recover from.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ransomware attacks dominated headlines throughout 2020, but as we round the corner into 2022 it’s imperative that people not let their guards down. Quite the opposite: evidence suggests that ransomware attacks are &lt;em&gt;still rising – &lt;/em&gt;and attackers are getting even bolder.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;h2&gt;Just released: Q3 survey results&lt;/h2&gt;

&lt;p&gt;The Ransomware Index Update for Q3 2021 continues to show a steady increase in all key ransomware markers. The headline-grabber: there has been a 4.5% increase in CVEs associated with ransomware and a 3.4% increase in ransomware families &lt;em&gt;over Q2 2021. &lt;/em&gt;That’s a notable increase in just one quarter, at a time when many businesses are starting to smooth out their Everywhere Workplace and, apparently, start to overlook clear risk factors.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The report, a collaboration between Ivanti, Cyber Security Works, and Cyware, also shows a 1.2% increase in older vulnerabilities tied to ransomware compared to Q2 2021.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The analysis uncovered 12 new vulnerabilities tied to ransomware in Q3 2021, bringing the total number of vulnerabilities associated with ransomware to 278. Out of the 12 vulnerabilities newly associated with ransomware, five are capable of remote code execution attacks and two are capable of exploiting web applications and being manipulated to launch denial-of-service attacks. The report also revealed that ransomware groups are continuing to find and leverage zero-day vulnerabilities, even before the CVEs are added to the National Vulnerability Database and patches are released. For example, the REvil group discovered and exploited a vulnerability in Kaseya VSA software as the security team at the company was actively working on a patch.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The report identified six new active and trending vulnerabilities associated with ransomware, plus three vulnerabilities belonging to 2020 or earlier that became newly associated with ransomware in Q3 2021. It’s clear that ransomware groups are not letting up. They’re continuing to evolve their tactics, rendering the traditional reactionary approach more futile than ever.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The solution: a proactive, risk-based approach that identifies and prioritizes vulnerabilities with intelligent data. Chasing after existing threats leaves companies constantly fighting from behind. On the flip side, it’s prohibitively difficult to try to patch and defend against every vulnerability at all times. Automated risk-based intelligence is a tool that businesses can leverage to stay ahead of increasingly sophisticated threats without using up excess human capital.&lt;/p&gt;

&lt;p&gt;To read the Ransomware Index Spotlight report in full, &lt;a href="https://www.ivanti.com/resources/library?eol=rl"&gt;click here&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For more on Ivanti’s risk-based solutions, &lt;a href="https://www.ivanti.com/products/ivanti-neurons-for-patch-management"&gt;click here&lt;/a&gt;.&lt;/p&gt;</description><pubDate>Tue, 09 Nov 2021 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">dac6f3f0-9859-43d6-9f3b-093b1c6cd5f6</guid><link>https://www.ivanti.com/blog/ransomware-is-on-the-rise</link><atom:author><atom:name>Srinivas Mukkamala</atom:name><atom:uri>https://www.ivanti.com/blog/authors/srinivas-mukkamala</atom:uri></atom:author><category>Security</category><title>Ransomware is on the rise. Here’s how Ivanti x RiskSense will solve it.</title><description>&lt;h2&gt;A few years ago, ransomware was just a nuisance. If that’s how you’re still treating it, this blog is for you.&lt;/h2&gt;

&lt;p&gt;Ransomware started making more headlines in 2016, but it was treated largely as a nuisance – not a tangible, resource-worthy threat. Fast forward to 2021 and ransomware has graduated to the big leagues, buoyed by a pandemic-fueled, hasty scramble toward decentralized workforces and digital &lt;em&gt;everything&lt;/em&gt;. But this rising threat can’t be entirely blamed on the pandemic. I had a front-row seat to the rise of ransomware as the founder of RiskSense, a pioneer in risk-based vulnerability management and prioritization. We started sounding the alarm years ago – we released a report in 2019 that identified three patterns that we felt were likely to become increasingly salient in the following years:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Ransomware will be offered as ransomware as a service.&lt;/li&gt;
	&lt;li&gt;Ransomware will be disruptive and destructive.&lt;/li&gt;
	&lt;li&gt;Ransomware will go beyond an endpoint and move into SaaS, apps, and the cloud.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;We were right to sound the alarm: our predictions were accurate on all counts. But this isn’t to say, “we told you so.” Instead, it’s to demonstrate how excited I am that Ivanti and RiskSense hold a shared mission of increasing awareness and delivering solutions to fight ransomware. And now, we get to work on that shared mission together. In case you haven’t heard the news, Ivanti today announced that it has acquired RiskSense. I truly believe the whole is greater than the sum of its parts – and the timing couldn’t be more critical.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Today, the impact of ransomware is widespread: healthcare, critical infrastructure, supply chain – no one is immune. Unpatched vulnerabilities remain one of the common points of infiltration into organizations’ ecosystems.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti has been a leader in patch management for many years, and as the ransomware threat elevated, they ramped up their efforts to stay ahead of the problem. RiskSense is part of that aggressive approach. The cloud-based RiskSense platform leverages risk-based scoring, exploit analytics and attack feasibility to identify critical security weaknesses with corresponding remediation action plans. This acquisition enables Ivanti to drive the next evolution of patch management, grounded in a proactive, risk-based approach. Combined with Ivanti’s existing capabilities, I believe this acquisition delivers a level of defense that is urgently needed right now.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Specifically, this defense translates to context and adaptive intelligence for security and IT teams around an organization’s exposures to actively exploited vulnerabilities. This includes intelligence on whether those vulnerabilities are tied to ransomware. And because insight is only half the battle, organizations will also be able to leverage our capabilities to quickly remediate those threats. The result: security and IT operations teams can be more efficient and effective in combating weaponized vulnerabilities used by cyber adversaries.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;In case your eyes glazed over during the preceding paragraph (understandable!) let’s highlight two key terms: &lt;em&gt;context&lt;/em&gt; and &lt;em&gt;adaptive intelligence. &lt;/em&gt;Patching without threat context is not effective. Too many organizations throw on patches without really understanding what they’re up against. This is an inefficient use of resources and is more likely to result in a frustrated IT team than an effective anti-ransomware campaign. Ivanti has the most robust data on patches, and RiskSense has the most robust data on vulnerabilities and exploits – including the ability to map them back to threat sources. These unique capabilities build on each other for a blended offering that’s unmatched in the market today.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;The impact: Learn. Patch. Adapt. Stay ahead of threats. A version of these capabilities, often piecemeal, are in place in a lot of companies. However, organizations are often plagued by missing elements: patching without context, or intelligence without the ability to take action. And even if they have most of the elements in place, the whole process is convoluted, resource-heavy and lengthy. Threat actors are rapidly increasing in boldness and sophistication, and all too often, a quasi-solution is developed long after the damage has been done.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti x RiskSense means being able to do in seconds what used to take days – and do it better.&amp;nbsp; Threat actors are efficient: they take the smoothest path to success, which means exploiting the most vulnerable opportunities. This often means taking advantages of organizations with a lot at stake like those in healthcare, education, and utilities.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Ivanti and RiskSense are not the only ones who’ve noticed that there is a problem. There is a global fight against ransomware, with a lot on the line. We’re committed to our part in that fight and, now that Ivanti and RiskSense have combined forces, we’re ready for the front lines.&lt;/p&gt;
</description><pubDate>Mon, 02 Aug 2021 12:30:16 Z</pubDate></item></channel></rss>