Containment can protect IoT and cloud infrastructure from malware
We have already seen two major cyberattacks in the last year where malware was has crippled government computer systems. Anyone familiar with this space needs no reminder of the Shamoon2 cyber attack on the government systems in Saudi Arabia; that attack wiped out information on 50,000 servers and devices. Then just last month, NotPetya wiped out data and disabled energy management systems of the Ukrainian government. History tells us the internet of things and cloud infrastructures will continue to see similar malware attacks unless countermeasures are taken.
Both malware attacks were highly destructive and were enabled by the complexity of patching large numbers of computing devices. In each instance, attackers were innovative in leveraging their malware to laterally scan for unpatched and vulnerable systems. These attacks should serve as a warning of the danger of malware that can autonomously hunt for targets, especially for those organizations deploying IoT infrastructure or migrating to the cloud.
Today, universal endpoint protection is impossible with the exploding numbers of devices connecting to enterprise clouds by employees and external entities alike. Infected devices can introduce malware, which can propagate to cloud-based applications and then spread rapidly through host apps. Read more…