As attacks just keep coming, breaches seem to be almost inevitable. Now it's time to shift our focus to how we detect intrusions once the attacked have gained access.
As Mark Kedgley, CTO of New Net Technologies, explains in this interview, there is no such as 100% security- if you want to connect with the rest of the world, you open yourself to cyber attacks. You need to spot malicious activity on your network when it happens- as soon as it happens.
File Integrity Monitoring (FIM), which registers changes done to files, is one way of going about it. But it can lead to a lot of false positives when regular and frequent legitimate changes- such as patching- take place. This can easily lead to alert fatigue. So we need to be smart about what kinds of alerts are generated, and learn what 'good' changes look like. If you operate properly locked-down configurations in your IT environment, this is possible, and it makes spotting & responding to malicious activity that much easier.