Buzz Established By Security Fabric At This Year’s Fortinet Accelerate Conference – Charles Leaver

Written By Josh Applebaum And Presented By Ziften CEO Charles Leaver

The Fortinet Accelerate 2017 conference was held recently in Las Vegas. Ziften has sponsored Fortinet’s yearly International Partner Conference for the second time, and it was a pleasure to be there! The energy at the show was palpable, and this was not due to the energy beverages you constantly see individuals carrying around in Las Vegas. The buzz and energy was contributed by an essential theme throughout the week: the Fortinet Security Fabric.

The premise of Fortinet’s Security Fabric is basic: take the disparate security “point items” that a company has released, and link them to utilize the deep intelligence each product has in their own security vault to supply a combined end to end security blanket over the whole organization. Though Fortinet is usually considered a network security business, their method to supplying a total security solution spans more than the traditional network to include endpoints, IoT devices, in addition to the cloud. By exposing APIs to the Fabric Ready partners as well as allowing the exchange of actionable risk intelligence, Fortinet is opening the door for a more collective strategy throughout the whole security industry.

It is revitalizing to see that Fortinet has the exact same beliefs as we have at Ziften, which is that the only way that we as a market are going to catch up to (and exceed) the hackers is through combination and cooperation across all reaches of security, despite which supplier provides each element of the total solution. This is not a problem we are going to resolve on our own, however rather one that will be solved through a combined method like the one set out by Fortinet with their Security Fabric. Ziften is proud to be an establishing member of Fortinet’s Fabric Ready Alliance program, integrating our special approach to endpoint security with Fortinet’s “think different” mindset of exactly what it suggests to incorporate and work together.

Throughout the week, Fortinet’s (really enthusiastic) channel partners had the chance to walk the program floor to see the incorporated solutions offered by the various innovation partners. Ziften showcased their integrations with Fortinet, containing the combination of our service with Fortinet’s FortiSandbox.

The Ziften solution collects unknown files from endpoints (clients or servers running OS X, Linux or Windows) and submits them to the FortiSandbox for analysis and detonation. Results are instantly fed back into Ziften for notifying, reporting, and (if possible) automated mitigation actions.

It was exciting to see that the Fortinet channel partners clearly got the worth of a Security Fabric approach. It was clear to them, along with Ziften, that the Security Fabric is not a marketing trick, however rather a genuine strategy assembled by, and led by, Fortinet. While this is only the beginning of Fortinet’s Security Fabric story, Ziften is delighted to collaborate with Fortinet and view the story continue to unfold!

2017 Will Bring Three Tiers Of Cyber Espionage – Charles Leaver

Written By Jesse Sampson And Presented By Ziften CEO Charles Leaver


There is a lot of debate at the moment about the hacking threat from Russia and it would be simple for security specialists to be excessively worried about cyber espionage. Since the objectives of any cyber espionage campaign dictate its targets, Ziften Labs can assist answer this concern by diving into the reasons why states perform these projects.

Last Friday, the 3 major United States intelligence agencies launched a detailed statement on the activities of Russia related to the 2016 United States elections: Examining the Activities of Russia and Intentions in Current United States Elections (Activities and Intentions). While some doubters stay unsure by the brand-new report, the threats recognized by the report that we cover in this post are engaging adequate to require examination and realistic countermeasures – in spite of the near impossibility of incontrovertibly identifying the source of the attack. Naturally, the main Russian position has actually been winking rejection of hacks.

“Normally these type of leakages occur not due to the fact that cyber criminals broke in, however, as any specialist will inform you, since someone just forgot the password or set the easy password 123456.” German Klimenko, Putin’s leading Web adviser

While agencies get criticized for bureaucratic language like “high confidence,” the considered rigor of instructions like Activities and Intents contrasts with the headline-friendly “1000% certainty” of a mathematically disinclined media hustler like Julian Assange.

Activities and Intentions is most perceptive when it locates the use of hacking and cyber espionage in “multifaceted” Russian doctrine:

” Moscow’s use of disclosures throughout the United States election was unmatched, but its influence campaign otherwise followed a longstanding Russia messaging strategy that blends concealed intelligence operations – such as cyber activity – with overt efforts by Russian Government agencies, state-funded media, third-party intermediaries, and paid social media users or “trolls.”

The report is weakest when assessing the motives behind the doctrine, a.k.a. method. Apart from some incantations about intrinsic Russian hostility to the liberal democratic order, it declares that:.

” Putin most likely wanted to reject Secretary Clinton because he has actually openly blamed her since 2011 for inciting mass protests against his regime in late 2011 and early 2012, and because he deeply resents comments he almost certainly viewed as disparaging him.”.

A more nuanced assessment of Russian inspiration and their cyber manifestations will assist us much better determine security strategy in this environment. Ziften Labs has determined three major tactical imperatives at work.

First, as Kissinger would say, through history “Russia came to see itself as a beleaguered outpost of civilization for which security could be found just through applying its absolute will over its next-door neighbors (52)”. US policy in the William Clinton era threatened this notion to the growth of NATO and dislocating financial interventions, maybe contributing to a Russian choice for a Trump presidency.

Russia has actually utilized cyberwarfare methods to secure its influence in previous Soviet areas (Estonia, 2007, Georgia, 2008, Ukraine, 2015).

Second, President Putin desires Russia to be a great force in geopolitics again. “Above all, we should acknowledge that the demise of the Soviet Union was a major geopolitical disaster of the century,” he said in 2005. Hacking identities of popular individuals in political, academic, defense, technology, and other institutions that operatives might leak to embarrassing or outrageous effect is a simple method for Russia to reject the US. The understanding that Russia can affect election results in the US with a keystroke calls into question the authenticity of US democracy, and muddles discussion around similar issues in Russia. With other prestige boosting efforts like pioneering the ceasefire talks in Syria (after leveling numerous cities), this technique could enhance Russia’s global profile.

Lastly, President Putin may harbor issues about his job security. In spite of very favorable election outcomes, in accordance with Activities and Intentions, protests in 2011 and 2012 still loom large in his mind. With several regimes altering in his neighborhood in the 2000s and 2010s (he said it was an “epidemic of disintegration”), some of which came about as a result of intervention by NATO and the United States, President Putin watches out for Western interventionists who wouldn’t mind a similar outcome in Russia. A collaborated campaign could assist challenge rivals and put the least aggressive candidates in power.

Due to these factors for Russian hacking, who are the most likely targets?

Due to the overarching goals of discrediting the legitimacy of the United States and NATO and assisting non interventionist candidates where possible, government agencies, particularly those with roles in elections are at greatest risk. So too are campaign agencies and other NGOs close to politics like think tanks. These have provided softer targets for hackers to access to sensitive info. This indicates that organizations with account info for, or access to, popular people whose details could result in humiliation or confusion for United States political, company, academic, and media institutions need to be extra careful.

The next tier of danger comprises crucial infrastructure. While recent Washington Post reports of a compromised US electrical grid ended up being overblown, Russia truly has hacked power grids and perhaps other parts of physical infrastructure like gas and oil. Beyond vital physical infrastructure, innovation, finance, telecoms, and media could be targeted as took place in Georgia and Estonia.

Lastly, although the intelligence agencies work over the past weeks has actually caught some heat for providing “apparent” suggestions, everybody really would gain from the pointers presented in the Homeland Security/FBI report, and in this blog about hardening your setup by Ziften’s Dr Al Hartmann. With significant elections coming up this year in critical NATO members the Netherlands, Germany and France, only one thing is guaranteed: it will be a busy year for Russian cyber operators and these recs should be a leading priority.