News Insights: CISA Insights Bulletin Urges U.S. Preparation for Data Wiping Attacks

News Insights:

Saryu Nayyar, CEO and Founder, Gurucul (She/Her):

“The CISA’s guidance has several detailed measures that should be followed by every organization. One area of particular note is ‘identifying and quickly assessing any unexpected or unusual network behavior’. This is especially relevant when it comes to unusual communications, but also privileged access violations. In fact, another piece of guidance states: ‘take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic’. It is critical to monitor for and determine if access violations are taking place, but with stolen credentials commonly being used by attackers appearing valid to most detection solutions, this is really where behavioral analytics can determine if the access is indeed legitimate, suspicious or malicious and help security teams investigate further or rapidly respond.”

Antonio Martinelli, Director of Cyber Training, GRIMM (

“Attack surface reduction is a critical aspect of any Information Security program, yet something companies have consistently been struggling with since The Internet became ubiquitous. We’re seeing it’s easier now more than ever for employees to spin up new cloud resources and enroll in SaaS services without proper channels being involved, leading to companies being hit by attacks in these ever-expanding blind spots. A cyclical process of active asset inventory identification and subsequent attack surface assessment & reduction is mandatory in this day and age of Shadow IT complacency.”