You Can’t Defend Against What You Can’t Detect: Malicious Signals in Legitimate Noise

Security Detection
Jason Soroko

As a CIO, CISO, or anyone else who has to defend a corporate environment from malicious activity, there are many point solutions to spend your budget on. A lot of these technologies are really good and there certainly is no shortage of them.  

Walk around a vendor floor of any large security conference and you could easily be convinced that there are ways to actually defend a corporate environment, especially when employed in systematic layers. If your budget can afford the staff to implement and use these tools, you really will catch the bad guy on your network. But you might not catch them all, and you might not catch them before they have reached their target.

Why are malicious groups, online criminals and rogue hackers so difficult to detect? It has a lot to do with the underlying nature of the technologies we use every day and how it allows a malicious actor to blend in with the legitimate things that happen on your desktop and on your network. 

This three-part series will educate how criminal organizations still seem to be able to bypass all those security layers and make new breach headlines every day.  

Jason Soroko
Jason Soroko
Manager, Security Technologies

Soroko has spent 17 years in systems architecture and development roles in diverse industries with an emphasis on security. As the threat landscape becomes more advanced, the need for Entrust to understand evolving threats requires deep and dedicated thinking in security concepts. Soroko's thought-leadership in security is rooted in connecting the threat perspective to how systems work as a whole. He frequents security conferences and publishes on important security topics.


Add to the Conversation