Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
Target's Weak Points, Examined
The Target breach proved once again that in security, technology is the easy part.
March 18, 2014
1 Min Read
I've been fascinated by the information that keeps coming out about last December's Target data breach. Recent revelations by some of the people who studied the actual malware code have described it as "absolutely unsophisticated and uninteresting -- almost amateurish." Others noted anti-malware software is available that could easily have stopped this attack before any damage was done.
Too bad Target didn't have it, right? But it did! Six months before the attack, Target had installed and tested software from FireEye (which the CIA also uses to protect its networks). In fact, Target had put in place 24-hour monitoring of the system to alert the monitoring team, who in turn would notify Target's Security Operations Center (SOC) in Minnesota.
So what happened? The alarm was raised, the monitors notified the SOC, and the SOC ... did nothing!
The FireEye software also has an option to automatically remove malware when it's detected. According to various reports, Target's security team had turned off that option. Is it any wonder that Target's CIO fell on her sword and resigned in the aftermath of this debacle?
For those of us not directly affected by the breach, the scenario as it played out is just one more example illustrating what I've tried to instill in my audiences for more than a decade: Technology is easy; it's people that are hard.
Read the rest of this article on Dark Reading.
About the Author(s)
Dave Kearns is a senior analyst for Kuppinger-Cole, Europe's leading analyst company for identity-focused information security and networking. His columns and books have provided a thorough grounding in the basic philosophies of directory technology, networking, and identity management to a generation of technologists.
You May Also Like