Welcome!

Security Authors: Elizabeth White, Sharon Barkai, Lori MacVittie, Pat Romanski, Michael Shaulov

Related Topics: SOA & WOA, Cloud Expo, Security

SOA & WOA: Article

Big Data-Toting Cyber-Security Posse Forming

Attribution, George Kurtz says, is the key piece missing in all existing security technologies

Armed with $26 million of Warburg Pincus' money, former McAfee CTO George Kurtz is going to try to stop the rape and pillage of corporate and government IP assets that's going on.

Warburg, where Kuntz was briefly executive-in-residence, plunked the first round money into his stealth start-up CrowdStrike, which says it's going to use Big Data technologies to stop the rampant thievery by identifying the perpetrator.

Building higher walls, Kuntz says, is useless. The "economic predators" - who may have already secretly modified key processes and data, and may eventually take down critical infrastructure - will just go get taller ladders.

Attribution, he says, is the key piece missing in all existing security technologies. "Knowing who is after your IP is critical in determining what assets you want to protect and how." That way you can figure out what needs defending first and how to tailor your tactics, techniques and procedures (TTPs) remembering that you can't defend it all. "Knowing their capabilities, objectives, and the way they go about executing on them is the missing piece of the puzzle in today's defensive security technologies. The key to success is raising the adversary's costs to exceed the value of the data they may be trying to exfiltrate and the only way to accomplish that is by forcing them to change the way they conduct the human-led parts of their intrusions, such as reconnaissance, lateral movement, identification of valuable assets and exfiltration."

In his experience hackers may change their tools but are slow to change their modus operandi.

Kuntz says he has been assembling a "dream team" to achieve CrowdStrike's purpose of fundamentally changing how organizations implement and manage security in their environment. He's looking for more "kick ass coders, consultants and experts who like us have been fighting and responding to nation-state targeted intrusions." Get in touch with him at [email protected].

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at)sys-con.com or paperboy(at)g2news.com, and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.