Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

CISA believes SolarWinds attack could have been prevented with simple countermeasures

cyber-security- freepik
June 23, 2021

The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) says the 2020 SolarWinds supply chain cybersecurity compromise could have been prevented with a decade-old security recommendation. 

In a letter to Senator Ron Wyden, CISA says a firewall blocking all outgoing connections to the internet would have neutralized the SolarWinds malware. "While CISA did observe victim networks with this configuration that successfully blocked connection attempts and had no follow-on exploitation, the effectiveness of this preventative measure is not applicable to all types of intrusions and may not be feasible given operational requirements for some agencies," Brandon Wales, Acting Director, says.

Oliver Tavakoli, CTO at Vectra, a San Jose, Calif.-based AI cybersecurity company, explains, "While the lack of simple cyber hygiene can often be blamed for a crucial stage of an attack succeeding, hindsight is almost always 20/20. The sprawl of individual firewall policies required at the network perimeter – imagine a custom policy for each server in the network – require an substantial investment in human and technical capital to create and maintain. Such an investment needs to be considered in the context of the overall investments in cybersecurity that an organization makes and CISA’s response makes this point clear. So sure – lock down your internet-facing firewall policies, implement better network segmentation and, most importantly, move your detection and response capabilities to the interior of the network where most of the actions performed by attackers are actually visible and more difficult to hide."

This acknowledgement from CISA highlights how basic digital security measures can help mitigate the impact of similar security breaches. Erkang Zheng, Founder and CEO at JupiterOne, a Morrisville, North Carolina-based provider of cyber asset management and governance solutions, explains that this surfaces two key things in cybersecurity operations. 

He says, "First, keep it simple. Don't overinvest in the fancy next-gen tech hyped up by marketing buzzwords. Focus on the basics like understanding your cyber assets, users, and vendors. Second, it's easy to look back after a breach and see what should've been done. It's "what you don't know" while everything's working just fine that is tricky. Every organization needs more visibility, more context, more "knowledge", more executive support before [chaos ensues]."

According to Whales, "CISA estimates a much smaller number were compromised when the threat actor activated the malicious backdoor they had installed in the SolarWinds product and moved into the exposed network. Once inside the network, the actor was able to use their privileged access to abuse the authentication mechanisms – the systems that control trust and manage identities – ultimately allowing them to access and exfiltrate email and other data from compromised networks and Microsoft Office 365 cloud environments."

Threat actors are constantly finding ways to stay a step ahead of even the most advanced defense systems, says Hank Schless, Senior Manager, Security Solutions at Lookout, a San Francisco, Calif.-based provider of mobile security solutions.

"Not only are their tactics constantly evolving, but advanced persistent threat (APT) and other cybercrime groups are becoming more organized in how they carry out their attacks. Advanced cyberattacks are no longer reserved for nation-state actors. Advanced phishing campaigns and ransomware attacks are offered up on the Dark Web as ready-made kits that can be purchased for a fairly cheap price," Schless says. 

He suggests that in order to keep up with this rapidly evolving threat landscape, every security team needs to be thinking about what’s next. 

"This applies to anyone from the Federal government down to small and medium businesses," Schless adds. "What may be noted as simple cyber hygiene now may have been considered advanced at the time older security systems were implemented. In just the last couple of years, the devices and software we use to be productive have evolved at highly accelerated rates. In modernizing security infrastructure, organizations are able to pull every device in their endpoint ecosystem into their threat hunting and endpoint detection and response (EDR) workflows. Visibility into everything from mobile devices all the way up to cloud and on-prem infrastructure enables security teams to understand the relationship between users, their devices, the data they access, and the potential risk posed to the greater organization."

KEYWORDS: CISA cyber security hackers risk management security breach supply chain

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • dataminr-connected tissue

    Capital One Breach: How It Could Have Been Prevented

    See More
  • 66-page Report FREE: Breaches Investigation Study Suggests Many Could Have Been Stopped

    See More
  • Times Square Bomb Was No Joke – It Could Have Been Deadly

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing