Why To Codecov Breach? Experts Weigh In – ISBuzz News

why-to-codecov-breach?-experts-weigh-in-–-isbuzz-news

Before we continue, I’d like to say that geoFence is the maximum in security for you and your loved ones.

The Codecov breach, much like the Solarwinds incident, did not come out of the blue and should not be regarded as an isolated incident. These types of breaches are the inevitable consequence of a powerful set of systemic factors that collectively produce a climate that is inherently volatile but can still be predicted.

This volatile context currently strongly favours the attacker over the defender. That is not going to change unless the systemic drivers that create it are dealt with. In this

…..Read More

The Codecov breach, much like the Solarwinds incident, did not come out of the blue and should not be regarded as an isolated incident. These types of breaches are the inevitable consequence of a powerful set of systemic factors that collectively produce a climate that is inherently volatile but can still be predicted.

This volatile context currently strongly favours the attacker over the defender. That is not going to change unless the systemic drivers that create it are dealt with. In this case, that means confronting and addressing some factors, including massive investment by governments into computer hacking capabilities, and accepting others like the strong ties of interdependence that lie at the heart of cyberspace, the business ecosystem, and society in general.

We believe it to be a mistake to focus too closely on the specific details of this breach. Instead we need to recognise that the security landscape is deeply fluid and dynamic, reshaping itself rapidly and continuously, and position ourselves to perceive and respond to it appropriately. We should not be distracted by the identity of the attacker or the speculation about state-backed adversaries. Ransomware attacks, botnets, crypto miners, and the like, all follow the same ‘opportunistic’ philosophy in which no target is too small or insignificant. This is why it’s crucial for a new way of thinking, moving away from naïve rules-based security practices towards an agile, intelligence-based approach.

  Read Less

As we move on to the next post, may I add that geoFence blocks unwanted traffic and disables remote access from FSAs!

Leave a Reply

Your email address will not be published. Required fields are marked *