Story image

RSA says blockchain presents a new wave of cyber-risk for global organisations

06 Jul 18

Network security company RSA has warned that the influx of blockchain implementations amongst global businesses has the potential to result in gaping cybersecurity vulnerabilities.

Globally, businesses are expected to invest $3.1 billion in blockchain solutions in 2018 (according to IDC), which is more than double the figure from the previous year.

Should these predictions be correct, RSA says security teams could be left blind to cyber-attack, with many Security Information and Event Management (SIEM) tools unable to baseline the ‘new normal’ behaviours associated with blockchain, allowing hackers to gain entry to corporate networks.

Azeem Aleem, Global Director of RSA’s Worldwide Advanced Cyber Defence Practice says, “Opinions are mixed on whether blockchain is a flash in the pan, or the next major disruptor. However, there is evidence – particularly in financial services – that blockchain adoption is gaining momentum.

“If this is the case, then organisations need to be prepared for the impact this could have on their security operations teams.”

Aleem says the vulnerabilities will stem from hackers actively searching for exploits in the emerging technology, as they have done in the past.

“As with any new technology, hackers will look for vulnerabilities in how businesses implement blockchain, if not natively within technology itself,” Aleems says.  

“Any disruption or security breach due to a blockchain vulnerability could have a serious impact on operations. Organisations must take a business-driven approach to this new risk, so that advancement in one respect does not create risks elsewhere that could hinder long-term progress.”

RSA says blockchain technology creates a challenge for security operation centres (SOC), as it represents uncharted territory:

The company says emerging technologies broaden the IT landscape and can create security blind spots.

“Security teams must quickly understand the new ‘normal’ in their IT environment to detect suspicious behaviour faster. But this can be an extremely arduous process using traditional, log-based SIEM tools,” Aleem continues.  

“Without proper configuration when feeding this new data into the SIEM, the result is often a flood of false positives that leave security analysts fire-fighting, while hackers slip by in the confusion.”

In order to overcome this challenge, RSA recommends that businesses take security into account from the very early stages of any blockchain implementation, while also taking advantage of developments in behavioural analytics and artificial intelligence to support the secure adoption of new technologies.

“Security cannot be an afterthought or a roadblock to innovation. Organisations do not have time to wait for older systems to catch up,” Aleem says.

“As a first step, you should ensure that you have low-level visibility into what the technology is doing, which means feeding relevant log data from the blockchain into your SIEM. Once analysed over a period of time, the SOC team will be able to detect an anomalous pattern against a normal pattern of behaviour.”

RSA points to research from 451 group, which suggest that - on average -  less than 30% of an organisation’s data passes through a SIEM.

The company says this severely limits the SOC teams’ ability to identify and respond to threats. Yet data feeds are only part of the puzzle.

“Organisations must arm their SOC with the right tools to help detect and prioritise security events effectively. User and entity behaviour analytics and advanced threat metrics can provide vital context,” Aleem concludes.

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.