Intelligent Tech Channels Issue 78 | Page 44

catastrophic the consequences of an accidental or unauthorised , malicious impact on the IT infrastructure can be .
DARREN ANSTEE , CHIEF TECHNOLOGY OFFICER FOR SECURITY , NETSCOUT
This is another demonstration of how dependent we are on both our IT infrastructure , and the supply chains that deliver tightly integrated capabilities within it . There will undoubtedly be a lot of questions raised around how to balance the need for regular security updates
Ranjan Singh , Chief Product Officer , Kaseya or software updates gone bad , is proper disaster recovery planning for the different types of outages . Disaster recovery planning must consider all outage scenarios to ensure that the core business can continue .
GRAHAM STEEL , HEAD OF CYBERSECURITY PRODUCT , SANDBOXAQ
We all learned from the global Solar Winds
catastrophe that we cannot blindly accept updates from software that impacts key systems . This new outage should spur all companies to put in place systems that will
Darren Anstee , Chief Technology Officer for Security , NETSCOUT and recovery plan to ensure resiliency against cyberattack , unintentional buggy code , and just about anything else .
The recommended workaround provided by CrowdStrike requires , in many cases , physical access to a machine . In other scenarios , recovery is complicated by additional security layers or lack of administrator rights . Unfortunately , this will mean many long days for IT administrators .
Graham Steel , Head of Cybersecurity Product , SandboxAQ for defence , compliance , with the risk of applying unqualified updates to systems .
This critical event serves as a wake-up call for businesses globally to reassess their IT infrastructure and the processes they have in place for software updates and security measures .
RANJAN SINGH , CHIEF PRODUCT OFFICER , KASEYA
While solution vendors certainly do their best when pushing out updates , widely deployed and trusted software solutions still run the risk of defective code , as in this case , or other bad code which may cause havoc . For critical system updates , many IT teams adopt a phased approach to rollout or testing updates in a sandbox environment . The catastrophe illustrates the challenge of widely deployed software without IT controls , and the critical needs for a backup
GUIDO GRILLENMEIER , PRINCIPAL TECHNOLOGIST , SEMPERIS
Due to the increased interdependencies between systems and software that controls them , be it to protect them or to merely
Guido Grillenmeier , Principal Technologist , Semperis update or monitor them , there are no guarantees these outages will not happen .
The one constant that does exist regardless of whether there is criminal intent analyse every update before it is allowed into their company . Recent consolidation in the cybersecurity market has increased the risk of this recurring – businesses rely on just a few vendors .
JAMES MAUDE , FIELD CTO , BEYONDTRUST
While any piece of software can be unstable or have bugs , it is particularly an issue for security vendors such as CrowdStrike , as they have a very deep integration into the operating system in order to monitor and protect the endpoint . This means that any bugs or instability can cause the entire operating system to crash which appears to be what we have unfortunately experienced .
There are a few strategies to mitigate the risks of unstable software updates , but ultimately it starts with the vendor conducting rigorous QA in test
44 www . intelligenttechchannels . com