{"id":360,"date":"2020-12-17T23:14:00","date_gmt":"2020-12-17T23:14:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=360"},"modified":"2024-08-02T14:34:05","modified_gmt":"2024-08-02T21:34:05","slug":"how-to-improve-security-posture","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/","title":{"rendered":"Shift Your Security Posture: Strength in Shared Vulnerability"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">TLDR: Take Action Now<\/h2>\n\n\n\n<p>The recent SolarWinds supply chain attacks reinforce that if your organization isn\u2019t proactively discovering and securing its attack surface, it needs to get started now. Attacks on the US Federal government highlight that highly distributed organizations with multiple divisions, branches, lines of business and agencies, need to map their extended IT ecosystem: Both what\u2019s yours and what\u2019s closely related. Attackers target the paths of least resistance; a weak link that leads back to your organization works just as well as \u2013 if not better \u2013 than a frontal attack.<\/p>\n\n\n\n<p>No, this isn\u2019t some New Wave blog post about psycho-babble vibes, it\u2019s about:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How FireEye has responded to APT29\u2019s abuse of SolarWinds as a trojan horse<\/li>\n\n\n\n<li>What full disclosure looks like<\/li>\n\n\n\n<li>Why these events are so critically important to every organization<\/li>\n\n\n\n<li>What you can specifically do with the CyCognito platform to proactively move your cybersecurity posture to the&nbsp;<em>left<\/em>&nbsp;to preempt a breach.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">There is no impenetrable armor.<\/h2>\n\n\n\n<p>In my 20+ years in cybersecurity, I\u2019ve yet to see the bad guys entirely prevented from \u201cgetting in\u201d once and for all. Eventually the odds stack up, and a breach occurs. There is no impenetrable armor. When I worked at Network Associates in 2001, it was Code Red that slammed our networks. And Symantec posted an early write up for SQL Slammer because it hit them too. The common element with security vendor breaches is typically downplaying the impact and a lack of transparency as a misplaced way to preserve stock valuation.&nbsp;<\/p>\n\n\n\n<p>Fortunately it\u2019s not every day that elite Red Team tools and tactics are exposed. Last time it was 2016 and the&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/The_Shadow_Brokers\">Shadow Brokers<\/a>&nbsp;leaking The Equation Group\u2019s NSA tools &#8211; leading to WannaCry attacks in May 2017 and other highly devastating attacks. The&nbsp;<a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/12\/unauthorized-access-of-fireeye-red-team-tools.html\">FireEye breach<\/a>&nbsp;is different: no&nbsp;<a href=\"\/blog\/cycognito-platform-automatically-detects-four-zero-day-vulnerabilities\/\">zero day vulnerabilities<\/a>&nbsp;were exposed and the company was extremely transparent and rapid in their response on December 8th. Their advisory begins with a powerful sentence:&nbsp;<\/p>\n\n\n\n<p><em>\u201cA highly sophisticated state-sponsored adversary stole FireEye Red Team tools\u201d<\/em><\/p>\n\n\n\n<p>Because they knew their tools were stolen they IMMEDIATELY took responsibility and released hundreds of countermeasures (against their own stolen intellectual property) so every organization can at least detect the indicators of compromise (IOCs) &#8212; albeit late (or to the right) in the&nbsp;<a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/\">attack lifecycle<\/a>&#8212; to mitigate further damage. Hopefully this breach will have a much lower impact than The Equation Group breach and set a good example &#8212; if not a new standard &#8212; of how such incidents should be handled in the future.<\/p>\n\n\n\n<p>The bottom line is that organizations need to shift to a more proactive stance so they can preempt attackers during their reconnaissance phase, to the&nbsp;<em>left<\/em>&nbsp;of initial access in the attack lifecycle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Professional Breach Response: A Timeline on GitHub<\/h2>\n\n\n\n<p>FireEye posted detective countermeasures against their Red Team tools on December 8th and has been updating them frequently:&nbsp;<a href=\"https:\/\/github.com\/fireeye\/red_team_tool_countermeasures\">https:\/\/github.com\/fireeye\/red_team_tool_countermeasures<\/a><\/p>\n\n\n\n<p>These countermeasures provide incredible insight into how FireEye was using only a relatively small number of highly powerful exploits to infiltrate customers&#8217; networks. While vulnerability scanners can trigger a large number of high severity issues that might distract you into&nbsp;<a href=\"https:\/\/www.helpnetsecurity.com\/2020\/09\/16\/how-security-theater-misses-critical-gaps-in-attack-surface\/\">security theater<\/a>&nbsp;activity, you need to focus on what\u2019s critical. In the present situation, special attention should be given to the products below that are targeted by the FireEye tools as they will now be specifically attractive to hackers with access to the breached trove:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Pulse Secure SSL VPN<\/li>\n\n\n\n<li>Fortinet Fortigate SSL VPN<\/li>\n\n\n\n<li>Windows Remote Desktop services<\/li>\n\n\n\n<li>Atlasian Crowd and Confluence<\/li>\n\n\n\n<li>Citrix ADC<\/li>\n\n\n\n<li>Zoho\u2019s ManageEngine<\/li>\n\n\n\n<li>Microsoft Exchange<\/li>\n<\/ol>\n\n\n\n<h5 class=\"wp-block-heading\">Protect Your Paths of Least Resistance<\/h5>\n\n\n\n<p>Proactively searching for these products in an organization is a first step in checking their posture, including validating the latest patches are applied, checking for default credentials, proper encryption settings, misconfigurations, unintended exposure to the internet, etc. And because we KNOW these tools were stolen from FireEye by bad actors, you can safely predict they will be used against you. Therefore, organizations need to better&nbsp;<a href=\"\/learn\/attack-surface-discovery.php\">discover these target assets<\/a>&nbsp;now before they become the paths of least resistance the bad guys find and exploit.<\/p>\n\n\n\n<p>Other information we can glean from the way FireEye is handling this breach comes from FireEye\u2019s Github where you can see a real-time response to a nation-state attack by a professional cybersecurity organization. Tools and tactics are being revealed quickly and secops is paying attention as you can see from the date stamps and download activities.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1268\" height=\"1520\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png\" alt=\"\" class=\"wp-image-368\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png 1268w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2-427x512.png 427w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2-768x921.png 768w\" sizes=\"auto, (max-width: 1268px) 100vw, 1268px\" \/><\/figure>\n\n\n\n<p>What\u2019s clear from the details released on December 14th about the <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-fireeye-confirm-solarwinds-supply-chain-attack\/\">supply chain attack on SolarWinds<\/a>&nbsp;&#8212; that lead to the breach at National Telecommunications and Information Administration, the US Treasury, and others &#8212; is that the SolarWinds&nbsp;<a href=\"\/blog\/cyber-risks-and-the-importance-of-attack-surface-management\/\">supply chain attack<\/a>&nbsp;is also how hackers gained access to FireEye&#8217;s network and that the incident was considered so serious that it led to a rare meeting of the U.S. National Security Council at the White House, on Saturday, December 12th.&amp; you can see from the Github screencap of the&nbsp;<a href=\"https:\/\/github.com\/fireeye\/sunburst_countermeasures\">SUNBURST countermeasures<\/a>&nbsp;FireEye released on Sunday, December 13 that they are meant to detect this attack in real time. In other words, FireEye personnel are working as fast as they can to make sure that this thing is understood and contained as much as possible. If only we had a time machine.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The \u201cStandard Response\u201d: Solarwinds Security Advisories<\/h2>\n\n\n\n<p>The FireEye response is exemplary and contrasts rather starkly with SolarWinds\u2019 neutral&nbsp;<a href=\"https:\/\/www.solarwinds.com\/securityadvisory\">Security Advisory<\/a>&nbsp;released December 14, that basically enumerates that any company running SolarWinds Orion platform with their software updates from March 26, 2020 onward had better be vigilant with quite a few software packages, including cybersecurity operations tools:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1260\" height=\"1304\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure3.png\" alt=\"\" class=\"wp-image-367\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure3.png 1260w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure3-495x512.png 495w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure3-768x795.png 768w\" sizes=\"auto, (max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n\n\n\n<p>The top line of the advisory on December 14th from SolarWinds uses passive voice to downplay the severity of the incident by calling out the sophistication of the attack, the manual effort involved and the versions affected.<\/p>\n\n\n\n<p><em>\u201cSolarWinds has just been made aware our systems experienced a highly sophisticated, manual supply chain attack on SolarWinds\u00ae Orion\u00ae Platform software builds for versions 2019.4 HF 5 and 2020.2&nbsp;with no hotfix&lt;\/span or 2020.2 HF 1.\u201d<\/em><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Not your standard \u201csophisticated attacker\u201d<\/h5>\n\n\n\n<p>This is not just your standard \u201csophisticated attacker\u201d though. APT29 is a nation state actor associated with Russia intelligence agencies that has essentially weaponized the SolarWinds\u2019 commercial software used by the U.S. government and other SolarWinds clients. They have turned commercial off the shelf software into a trojan horse with privileged network access to every device and system it\u2019s configured to monitor and manage. Microsoft\u2019s Security Response Center provides an&nbsp;<a href=\"https:\/\/msrc-blog.microsoft.com\/2020\/12\/13\/customer-guidance-on-recent-nation-state-cyber-attacks\/\">excellent write-up<\/a>&nbsp;if you\u2019d like more details and, even as this is being written, we\u2019re fully expecting to see more details emerge.<\/p>\n\n\n\n<p>By December 15th at 8:00 a.m. SolarWinds provided an update with much stronger language about what they understood happened and clear indication of the steps they\u2019ve taken to mitigate the threat and validate what software packages are, and are not impacted.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1260\" height=\"526\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure4.png\" alt=\"\" class=\"wp-image-366\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure4.png 1260w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure4-512x214.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure4-768x321.png 768w\" sizes=\"auto, (max-width: 1260px) 100vw, 1260px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">So What is the Potential Impact?<\/h2>\n\n\n\n<p>SolarWinds tools are doing network monitoring, virtualization management, voice over IP management, controlling high availability, and performing log analysis. In other words, by exploiting the Orion platform, the bad guys could own your network along with the instrumentation that might stop them or allow you to detect them. And depending on what packages you\u2019ve installed on the Orion Platform, they may be managing your cloud environment, firewalls, routers, and switches, your IP addresses, and even DNS. For example:<\/p>\n\n\n\n<p>1.&nbsp;<a href=\"https:\/\/www.solarwinds.com\/virtualization-manager\">SolarWinds VMAN<\/a>&nbsp;can add, edit, or remove managed cloud instances in AWS and Azure. So in addition to looking for exposed SolarWinds systems, you will want to check for unexpected or absent cloud assets with your&nbsp;<a href=\"\/learn\/attack-surface-management.php\">attack surface management<\/a>&nbsp;platform. For organizations with significant digital transformation efforts in place, or those generally leveraging the cloud &#8212; the case with the anonymized CyCognito customer in the screenshot below \u2013 this can be a significant exposure. In this case, there are 23,000 assets classified as Infrastructure as a Service (IaaS).:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1258\" height=\"732\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure1.png\" alt=\"\" class=\"wp-image-365\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure1.png 1258w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure1-512x298.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure1-768x447.png 768w\" sizes=\"auto, (max-width: 1258px) 100vw, 1258px\" \/><\/figure>\n\n\n\n<p>2.&nbsp;<a href=\"https:\/\/www.solarwinds.com\/network-configuration-manager\">SolarWinds Network Configuration Manager<\/a>&nbsp;can configure Cisco, Juniper, and Palo Alto firewalls and switches, so you\u2019ll want to find those and double check they aren\u2019t configured as a path of least resistance into your network. Here is a search for these platforms in the&nbsp;<a href=\"\/platform\/\">CyCognito platform<\/a>&nbsp;as an example, classified automatically into environments. The key takeaway is that you are going to want to find and audit all of the systems like these if you were using the compromised SolarWinds platform with the back-doored updates.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1256\" height=\"798\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure7.png\" alt=\"\" class=\"wp-image-364\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure7.png 1256w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure7-512x325.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure7-768x488.png 768w\" sizes=\"auto, (max-width: 1256px) 100vw, 1256px\" \/><\/figure>\n\n\n\n<p>3. And with control of&nbsp;<a href=\"https:\/\/www.solarwinds.com\/ip-address-manager\">SolarWinds IP Address Manager<\/a>, an attacker potentially has access to the managed IPs, DHCP settings, and DNS Domains managed from the compromised Orion Platform. Here is another example from the CyCognito platform. Again, you will want to investigate changes in your organization that took place since March 2020 if you were using that compromised SolarWinds package.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1256\" height=\"486\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure8.png\" alt=\"\" class=\"wp-image-363\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure8.png 1256w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure8-512x198.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure8-768x297.png 768w\" sizes=\"auto, (max-width: 1256px) 100vw, 1256px\" \/><\/figure>\n\n\n\n<p><br>4. There is one other asset type beyond IPs and domains that may be affected. Because this backdoor can allow attackers to gain access to your organization\u2019s global administrator account and\/or trusted SAML token signing certificate, they can forge certificates or credentials. So you&#8217;re going to want to investigate user accounts and certificates and make sure the spy accounts and certificates are booted. The CyCognito platform can help with finding the SolarWind certificates in your organization as shown in this anonymized example:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1256\" height=\"1166\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure9.png\" alt=\"\" class=\"wp-image-362\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure9.png 1256w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure9-512x475.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure9-768x713.png 768w\" sizes=\"auto, (max-width: 1256px) 100vw, 1256px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So, what are we to do with all this?\u00a0<\/h2>\n\n\n\n<p>Hopefully your SOC has already started using the various rules and countermeasures posted by FireEye to detect IOCs associated with these tools and tactics! And if you have one, use a time machine to go back to pre-COVID-19 and before the SolarWinds compromise, but realistically, just do the monitoring. And proactively, going forward, contact whoever manages your attack surface visibility and ask them for a report on every asset running SolarWinds Orion Platform and any assets (IPs, cloud, domains, and certificates) monitored or managed by that platform! If you don\u2019t have this kind of visibility, then you might want to look at having a conversation with CyCognito about how we can move your&nbsp;security posture&nbsp;<a href=\"https:\/\/attack.mitre.org\/matrices\/enterprise\/pre\/\">rapidly to the left<\/a>&nbsp;and help you see where you need to defend.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lessons Learned &#8211; Attacks on SolarWinds reinforce that your organization needs to proactively discover and secure its attack surface. See how to do it.<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[114,109,49],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-fireeye","tag-solarwinds","tag-vulnerability-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shift Your Security Posture: Strength in Shared Vulnerability | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shift Your Security Posture: Strength in Shared Vulnerability | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Lessons Learned - Attacks on SolarWinds reinforce that your organization needs to proactively discover and secure its attack surface. See how to do it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-17T23:14:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T21:34:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png\" \/>\n<meta name=\"author\" content=\"Jim Wachhaus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Wachhaus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/\"},\"author\":{\"name\":\"Jim Wachhaus\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\"},\"headline\":\"Shift Your Security Posture: Strength in Shared Vulnerability\",\"datePublished\":\"2020-12-17T23:14:00+00:00\",\"dateModified\":\"2024-08-02T21:34:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/\"},\"wordCount\":1744,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png\",\"keywords\":[\"FireEye\",\"SolarWinds\",\"Vulnerability Management\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/\",\"name\":\"Shift Your Security Posture: Strength in Shared Vulnerability | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png\",\"datePublished\":\"2020-12-17T23:14:00+00:00\",\"dateModified\":\"2024-08-02T21:34:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png\",\"width\":1268,\"height\":1520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shift Your Security Posture: Strength in Shared Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0\",\"name\":\"Jim Wachhaus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g\",\"caption\":\"Jim Wachhaus\"},\"description\":\"Was Director of Technical Product Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shift Your Security Posture: Strength in Shared Vulnerability | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/","og_locale":"en_US","og_type":"article","og_title":"Shift Your Security Posture: Strength in Shared Vulnerability | CyCognito Blog","og_description":"Lessons Learned - Attacks on SolarWinds reinforce that your organization needs to proactively discover and secure its attack surface. See how to do it.","og_url":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/","og_site_name":"CyCognito Blog","article_published_time":"2020-12-17T23:14:00+00:00","article_modified_time":"2024-08-02T21:34:05+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png","type":"","width":"","height":""}],"author":"Jim Wachhaus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Wachhaus","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/"},"author":{"name":"Jim Wachhaus","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0"},"headline":"Shift Your Security Posture: Strength in Shared Vulnerability","datePublished":"2020-12-17T23:14:00+00:00","dateModified":"2024-08-02T21:34:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/"},"wordCount":1744,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png","keywords":["FireEye","SolarWinds","Vulnerability Management"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/","url":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/","name":"Shift Your Security Posture: Strength in Shared Vulnerability | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png","datePublished":"2020-12-17T23:14:00+00:00","dateModified":"2024-08-02T21:34:05+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/CyCognito-Blog_Shift-Your-Security-Posture_Figure2.png","width":1268,"height":1520},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/how-to-improve-security-posture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Shift Your Security Posture: Strength in Shared Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/26e362ecf750edd0380a7de5746cf8d0","name":"Jim Wachhaus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79b6bf97cd7168a87f54b0b9f6ce82be?s=96&d=mm&r=g","caption":"Jim Wachhaus"},"description":"Was Director of Technical Product Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/jim-wachhaus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":10,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"predecessor-version":[{"id":1014,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/360\/revisions\/1014"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}