• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Mastering network security: Outsmarting threat actors in the digital age

Kenneth Chen by Kenneth Chen
January 6, 2025
Mastering network security: Outsmarting threat actors in the digital age

Photo by cottonbro studio: https://www.pexels.com/photo/woman-in-black-tank-top-4753927/

Share on FacebookShare on Twitter

Singapore's position as one of the wealthiest countries in the world in 2024 reflects its economic strength, with a GDP per capita that rivals the best. But this prosperity also has a downside, as cybercriminals are now homing in on the nation's sophisticated digital infrastructure and are looking for opportunities to attack.

The situation is made worse because these attacks are becoming incredibly profitable for cybercriminals. For instance, Singapore tops the list of countries where organisations pay ransom for ransomware attacks, with 27% choosing to pay every time. The average payout is SGD4.49 million (USD3.3 million), significantly more than the global average of SGD3.2 million (USD2.5 million).

The Singapore Cyber Landscape (SCL) 2023 report by the Cyber Security Agency of Singapore (CSA) also points to increasing threats to supply chains, expanded operations of hacktivists, and malicious actors' use of generative AI.

This increasingly perilous cyber landscape has prompted Singapore's lawmakers to recently pass the Cybersecurity (Amendment) Bill 2024, which extends regulatory oversight to high-risk, critical computer systems.

Why EDR alone isn't enough

A noticeable shift in cybercriminal behaviour is that they rely less on malware as an entry point. The CrowdStrike 2024 Global Threat Report shows a stark decline: malware-based attacks are down from 60% in 2019 to 25% in 2023.

To gain initial access, cybercriminals are increasingly exploiting compromised credentials, software vulnerabilities (including zero-days), and weaknesses in cloud security.

This escalation requires serious consideration. Organisations have relied on Endpoint Detection and Response (EDR) solutions to secure their systems for years. However, today's threat actors are becoming more adept at circumventing these controls — not just evading them but actively disabling them with tools aptly named "EDR killers", effectively allowing them to move undetected across an organisation's infrastructure.

Related:  Educational institutions face soaring cyber costs

More generally, over-reliance on EDR alone can be dangerous, and companies risk leaving themselves vulnerable if they do not diversify their defences.

Early detection is key to limiting the damage caused by attacks and reducing data loss. According to the IDC 2023 Future Enterprise Resiliency and Spending (FERS) survey, 71.5% of organisations in Asia-Pacific and Japan (APJ) said that threat detection and response technologies such as EDR, NDR and SIEM help them to catch attacks before intruders could take action.

IDC also emphasises that any effective Extended Detection and Response (XDR) solution should include EDR as a core component, enhanced by Network Detection and Response (NDR), the integration of external threat intelligence and a strong log management infrastructure to generate alerts from virtualised cloud resources.

Strengthening cyber defences with NDR

Unlike EDR, which focuses on protecting individual endpoints, NDR monitors network traffic for suspicious activity. This allows NDR to detect threats that may not be visible to endpoint-based security solutions, such as lateral movement or network-based attacks.

While NDR is highly effective on its own, its capabilities are greatly amplified when used alongside other platforms. Integrating NDR with control points such as endpoint, data, identity, and application allows for more accurate filtering of alerts and helps identify a single, trusted source of truth.

So, what should an organisation prioritise in an NDR solution? Some of the most advanced and reliable solutions can monitor network traffic in real time, covering both north-south and east-west movement, even if the data is encrypted.

This allows them to capture important details such as transaction logs, NetFlow data, and complete packet information across all network layers. This level of detail provides organisations with deeper context and metadata, which is invaluable for meeting stringent compliance standards.

Related:  GenAI threat is bigger than opportunity, warns Tenable study

Traditional tools such as SIEM, IDS/IPS, and firewalls fall short of this level of visibility and detection, lacking the necessary depth to combat sophisticated attacks effectively.

As we reach the end of 2024, the global average data breach cost has hit a record high of USD 4.88 million, and the rise of "killer tools" designed to circumvent long-established EDR systems is only making matters worse.

For organisations in Singapore, this is a clear signal that they need to adapt, rethink their strategies, and take immediate action to strengthen their security posture before a costly incident occurs. By integrating solutions like NDR alongside EDR, they can develop operational resilience in the face of cunning threat actors and their ever-evolving tactics.

Tags: CrowdStrikeEDRExtraHopXDR
Kenneth Chen

Kenneth Chen

Before joining ExtraHop as the AVP of Asia, Kenneth Chen had a productive career spanning more than 20 years in enterprise technology and cyber security. He is an expert on the ASEAN region, especially on the intersection of SME policy and technology in digital transformation and digital ecosystems, making him an invaluable addition to the ExtraHop team. Chen has worked for many industry giants, including Symantec, Forescout Technologies, Broadcom Cyber Securities, Blue Coat Technologies and Brocade.

No Result
View All Result

Recent Posts

  • DDoS attacks surge in Asia Pacific, claims Cloudflare
  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl