The Qlik Cyber Attack: Why SSPM Is a Must Have for CISOs

On November 28 2023, Arctic Wolf Labs reported on a new Cactus ransomware campaign which exploits publicly-exposed installations of Qlik Sense, a cloud analytics and business intelligence platform.
With a breach like Qlik, the first question that comes to mind is: "Are we exposed? What is the impact?".
Most security and IT teams can confirm the use of specific apps across an organization.
Applications' usage and security configuration settings are not rigorously tracked after approval.
End-users may bypass security to install freemium apps, often enabling full Read/Write access and integration with business-critical apps such as Hubspot, Salesforce, and M365. Inheritance of refresh tokens or non-expiring access tokens.
Security teams often have to resort to traditional methods to determine who's doing what, where.
They may send blast communications asking colleagues if they use an app, in hopes of fast replies.
SaaS Security Posture Management Tools tools provide the visibility and automation to investigate and prevent SaaS-to-SaaS risk.
Such a solution enhances any cybersecurity team's ability to gain insights and protect every enterprise SaaS application and ensure operational continuity.
SSPM tools enable security teams to identify sanctioned or unsanctioned SaaS-to-SaaS connections, allowing CISOs to detect and identify the impact of a SaaS breach.
By incorporating an SSPM solution, you can take the first step to building a robust SaaS security program and understand how SaaS security threats may impact your business.
From alerts for possible misconfigurations, SaaS-to-SaaS connections, or determining levels of access, SSPM can help you secure the applications to run your business.
Our own cybersecurity and IT teams leveraged the AppOmni platform to get a cursory glance and deeper look at Qlik's potential impact to our business.
In mere seconds, we were able to determine the scope of the potential threat and which SaaS apps Qlik connected to.
The security team identified Qlik connections to Salesforce and Google Workspace.
With an additional pivot, the AppOmni platform also identified the application owners of the applications.
This enabled the team to promptly notify the app owners to disconnect from Qlik, limiting any exposure or impact from the attack.
We can do the same to help your cybersecurity team achieve visibility and control over your SaaS estate.
SaaS applications need a virtual command room where security teams can manage their complex SaaS estate securely and holistically.
Learn what makes a robust SaaS Security Posture Management solution and its key capabilities.


This Cyber News was published on securityboulevard.com. Publication date: Fri, 01 Dec 2023 23:06:57 +0000


Cyber News related to The Qlik Cyber Attack: Why SSPM Is a Must Have for CISOs

The Qlik Cyber Attack: Why SSPM Is a Must Have for CISOs - On November 28 2023, Arctic Wolf Labs reported on a new Cactus ransomware campaign which exploits publicly-exposed installations of Qlik Sense, a cloud analytics and business intelligence platform. With a breach like Qlik, the first question that ...
1 year ago Securityboulevard.com Cactus
Improve Your Business with SSPM - Security Posture Management - As more businesses move to the cloud, security becomes an ever-increasing concern. If a business’s data are not properly monitored, it can lead to serious security breaches. Security Posture Management (SSPM) is an innovative security solution that ...
2 years ago Thehackernews.com
Human error still perceived as the Achilles' heel of cybersecurity - While fears of cyber attacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats, reflecting a significant shift in the cybersecurity landscape, according to Proofpoint. CISOs' confidence is ...
1 year ago Helpnetsecurity.com
Proofpoint's CISO 2024 Report: Top Challenges Include Human Error & Risk - In Proofpoint's 2024 Voice of the CISO report, the cybersecurity company found that CISOs are dealing with people-centric threats more than ever. Plus, cybersecurity budgets often don't change, and AI can help and hurt CISOs' efforts. Regarding the ...
1 year ago Techrepublic.com
Qlik Sense Vulnerabilities Exploited in Ransomware Attacks - Three vulnerabilities affecting a product of business analytics firm Qlik have likely been exploited in ransomware attacks, according to security operations firm Arctic Wolf. The cybersecurity company has reported seeing attacks that appear to ...
1 year ago Packetstormsecurity.com CVE-2023-41266 CVE-2023-41265 CVE-2023-48365 Cactus
The CISO’s Role In Ensuring Compliance Amid Evolving Cyber Threats - By extending compliance and security requirements to third-party relationships, organizations can reduce their exposure to external threats and ensure that their entire supply chain operates in accordance with regulatory standards. As a result, ...
1 month ago Cybersecuritynews.com
How the Evolving Role of the CISO Impacts Cybersecurity Startups - It helps startups striving to meet the ever-evolving needs of CISOs, who are simultaneously seeking the elusive but paramount buy-in from business users and executives. The CISO role has evolved dramatically in the past few years in response to ...
1 year ago Darkreading.com
Why Modern CISOs Must Be Business Translators, Not Just Technologists - This evolution means that modern CISOs must excel as technologists and business translators professionals who can bridge the gap between complex technical realities and the organization’s strategic objectives. By translating technical risks into ...
2 months ago Cybersecuritynews.com
The New CISO: Rethinking the Role - Dating back to the 1990s, the role of CISO was more technical and IT-focused. CISOs face more risks than can be resolved, are expected to balance security with operational capability, and must convince leaders to invest in protection. Today, CISOs ...
1 year ago Darkreading.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
2 months ago Cybersecuritynews.com
Meet Your New Cybersecurity Auditor: Your Insurer - As businesses deal with the fallout of massive ransomware waves, from Lapsus$ to Cl0p/MOVEit, an unlikely new entity is joining the regulatory bodies to raise the bar for cybersecurity: the cyber insurer. Their coverage requirements and ...
1 year ago Darkreading.com LAPSUS$
Security tools fail to translate risks for executives - Organizations are struggling with internal communication barriers, which hinder their ability to address cybersecurity threats, according to Dynatrace. The results indicate that CISOs encounter challenges in aligning security teams with the C-suite, ...
1 year ago Helpnetsecurity.com
Overtaxed State CISOs Struggle with Budgeting, Staffing - Though the number of scarily understaffed offices has dropped — just two respondents reported having one to five full-time employees, down from six in 2022 — more than half of state CISOs report that their staff lack the competencies necessary to ...
8 months ago Darkreading.com
How CISOs Can Build Trust with Stakeholders in a Data-Driven Era - By aligning security with business goals, speaking the language of stakeholders, and using data to highlight achievements, CISOs can cement their role as indispensable partners in the data-driven era. By adopting these strategies, CISOs can transform ...
1 month ago Cybersecuritynews.com
Why CISOs and CTOs Must Collaborate More Than Ever in Today’s Security Landscape - When CTOs view CISOs as strategic partners rather than barriers to innovation, and CISOs champion security as a driver of business value, organizations can respond quickly to threats while confidently pursuing new opportunities. CTOs leading these ...
1 month ago Cybersecuritynews.com
Navigating the New Age of Cybersecurity Enforcement - Many equate this move as akin to a bomb going off for people working in the CISO role. CISOs are now faced with unprecedented potential liability risks, prompting the need for a proactive approach to legal exposure for security executives. To shed ...
1 year ago Darkreading.com
How CISOs Can Prepare for Evolving Data Privacy Regulations - This article explores how CISOs can proactively address the challenges of evolving data privacy regulations, focusing on strategic leadership, operational best practices, and future-proofing security programs in a dynamic global landscape. In the ...
1 month ago Cybersecuritynews.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
8 months ago Cyberdefensemagazine.com Akira
What do CISOs need to know about API security in 2024? - According to Postman's 2023 State of the API Report, roughly 66% of participants indicated that their APIs contribute to generating revenue. A recent ESG survey on API security showed that 92% of organisations using APIs have experienced a breach in ...
1 year ago Cybersecurity-insiders.com
Top 3 Priorities for CISOs in 2024 - As the new year begins, CISOs gather with their security teams and corporate management to scope out top priorities for 2024 and how to address these issues. This year - with a multitude of new privacy laws, Securities and Exchange Commission ...
1 year ago Darkreading.com
CISOs Face 2025 Cyber Threats with Shrinking Budgets and High Demands - Below, we explore the evolving role of CISOs under three critical themes: navigating budget constraints, addressing emerging threats, and redefining leadership in cybersecurity. In 2025, successful CISOs are not just technical experts but strategic ...
2 months ago Cybersecuritynews.com
Soft Skills Every CISO Needs to Inspire Better Boardroom Relationships - In a recent survey of CISOs, 86% of respondents said the role has changed so much that it's almost become a different job altogether from what it once was. In addition to their traditional responsibility of defending organizations from an ...
1 year ago Darkreading.com
How CISOs Can Successfully Lead Security Transformation in Hybrid Work Environments - Additionally, CISOs must work closely with HR, IT, and business leaders to integrate security considerations into every aspect of the employee lifecycle, from onboarding to offboarding, ensuring that security remains top of mind as roles and work ...
1 month ago Cybersecuritynews.com
Securing IoT Devices - CISO’s Strategic Resource Guide - The rapidly changing threat landscape demands that CISOs foster a culture of security awareness and shared responsibility across all organizational levels. As new technologies like AI-driven anomaly detection or quantum-resistant encryption emerge, ...
1 month ago Cybersecuritynews.com
Why CISOs and CIOs Should Work Together More Closely - Although there are overlaps in the goals and responsibilities of the CIO and the CISO, there are also challenges that get in the way of a more cohesive relationship, including reporting lines, organizational structures, budgets, and risk appetites. A ...
1 year ago Feedpress.me