Interview with Terry Dickson, CEO and Co-Founder of Avinti
by Mirko Zorz - Friday, 14 October 2005.
Terry Dickson is the CEO and Co-Founder Avinti. After 23 years in the industry, Terry Dickson has extensive IT and high-technology industry experience including six years with Intel Corporation. In addition to growing revenue from $15 million to over $100 million in the formative years of the Intel software operation, Dickson also served as the director of Intel's Wired for Management initiative and the chairman of DMTF (Distributed Management Task Force).

Recently Avinti issued a security alert regarding a newly discovered targeted destination e-mail attack. Can you give us some details?

Targeted destination attacks are fairly academic and we've known they exist for some time but preventing and dealing with them has become a critical security issue. Companies faced with the infiltration of their networks are finding that the attacks are much more savvy and difficult to find and by the time they are found, they could have been plundering the network for days.

Clearly, the developers of malicious software are intelligent and well-trained. As such, they find innovative ways to bypass existing mechanisms for security. One such method was discovered as a recent virus distribution methodology was discovered to have by-passed to existing routing structure for e-mail in the internet. A recent variant was designed to bypass any hosted security solution, by going direct to a harvested IP address of the outward-facing gateway. This was not a chance occurrence. The malware AND distribution were a custom designed targeted attack for one specific customer.

During targeted destination attacks, all of this activity bypasses pattern-based security measures so the network can be under attack for a long period of time without the possibility of a new pattern being generated. Obviously this can cause a loss of proprietary assets and damage to the company network.

What is, in your opinion, the biggest challenge in protecting sensitive information at the enterprise level?

Probably the single biggest challenge in protecting sensitive information comes from underestimating how good the hacker community has become, and just how valuable personal and private data has become. A recent security report noted that the online theft of assets was Africa's biggest "industry". Digital identities, credit card numbers and intellectual property are worth a lot of money to criminals. It's an epidemic global issue and it continues to increase. On the black market, targeted destination attacks have become the preferred tool of the cyber criminal as it bypasses the most widely-deployed protection-the pattern-based AV solution.

There are a number of factors involved in keeping sensitive information safe, but a company interested in protecting its assets will be thorough in its security assessment and ongoing auditing; the IT group will constantly evolve enterprise defenses, utilizing a number of security tools and solutions to protect every known entry point in the organization whether that be firewalls, intrusion detection, authentication, anti-spam, anti-spyware, anti-virus, etc.

A problem arises when a company puts too much faith into one product or solution when the reality is that no one product is capable of adequately protecting every level of an organization. A unified framework of solutions that also anticipates what may be of value to an attacker is what will at least keep a company a few steps ahead of the game.

What do you see your clients most worried about?

Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Aug 27th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //