How the NSA Could Have Avoided the Edward Snowden Breach
Although organizations have increased their investments in security solutions, the cost of cybercrime has increased by 78% over the last four years. Never have organizations faced such a barrage of constant cyber-attacks. Cyber-criminals and nation-states are successfully syphoning off the intellectual property of the world’s businesses, governments and militaries. Despite the fact that companies will spend US$68.34 billion globally on cyber-security solutions this year, 95 percent of them have already been compromised.
Organizations need to protect themselves against not only external threats but also insider threats. For all the security technology investments the U.S. National Security Agency (NSA) makes, the agency did not detect or prevent Edward Snowden’s attack. Like many of the attackers responsible for cyber-threats, Snowden took advantage of the trust established by cryptographic keys and digital certificates, and used them to disguise his unauthorized activity, to elevate his privileges and to exfiltrate classified information. Exploiting the trust that keys and certificates establish provides malicious actors with a new way to infiltrate an organization’s network. Organizations, governments, and security solutions inherently trust keys and certificates; malicious actors understand this and use it to their advantage.
Learn more about how Edward Snowden compromised the NSA.
- Read the Blog: Deciphering How Snowden Breached the NSA
- Watch The Snowden Breach: Attack Steps & Prevention Webinar
- View Breaching the NSA Infographic