By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
The Tech MarketerThe Tech MarketerThe Tech Marketer
  • Home
  • Technology
  • Entertainment
    • Memes
    • Quiz
  • Marketing
  • Politics
  • Visionary Vault
    • Whitepaper
Reading: Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks
Share
Notification Show More
Font ResizerAa
The Tech MarketerThe Tech Marketer
Font ResizerAa
  • Home
  • Technology
  • Entertainment
  • Marketing
  • Politics
  • Visionary Vault
  • Home
  • Technology
  • Entertainment
    • Memes
    • Quiz
  • Marketing
  • Politics
  • Visionary Vault
    • Whitepaper
Have an existing account? Sign In
Follow US
© The Tech Marketer. All Rights Reserved.
The Tech Marketer > Blog > Technology > Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks
Technology

Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks

Last updated:
4 years ago
Share
Andrew Egoroff, ProcessUnity: On the increased cybersecurity threat and mitigating risks
SHARE

Cloud Tech caught up with Andrew Egoroff, Senior Cybersecurity Specialist at ProcessUnity, to discuss the increased threat around the Russia-Ukraine crisis and how to mitigate risks from third parties.

Contents
Oh hi there 👋It’s nice to meet you.Sign up to receive awesome content in your inbox, every week.

A business can implement excellent internal cybersecurity measures, but a slip-up from a third-party vendor can have devastating consequences. ProcessUnity specialises in helping businesses determine what vendors carry the lowest risk.

“We try and evangelise the philosophy of assessing your third parties with the same controls you’re using for your internal network,” explains Egoroff. “If you consider third parties to be an entry point into your network, then it’s very key that you have those sort of controls.”

Most vendors will have done some previous assessment of their cybersecurity against an industry framework. If they haven’t, it might be time to consider a different vendor.

Egoroff has some additional tips to lower a specific vendor’s risk to your organisation.

“Understanding what data is in your internal network and what the external third party has access to defines the controls required,” says Egoroff.

“For example, if you’ve got credit card data and your third party is accessing that data for whatever reason—that starts defining the scope of not only your infrastructure but also the controls that need to be applied around that set of data for that third party.”

Zero-trust models are being increasingly evangelised. The idea behind zero-trust is that implicit trust is eliminated and only the bare minimum access to perform certain tasks is assigned.

Egoroff believes more organisations should adopt a zero-trust model and notes how the Russia-Ukraine war highlights the need to do so.

“There was a bug bounty released by organisations on the Russian or Ukraine side asking for people to find vulnerabilities against infrastructure, public services, that sort of stuff,” says Egoroff.

“The term that I heard was that now is the first time in history that everybody can participate in a war. It’s really enhancing or furthering that importance of making sure there’s zero trust.”

The heightened risk around the conflict drives home the need for robust cybersecurity measures.

“It’s not just a simple case of doing an assessment or running a vulnerability scan and achieving a baseline—it’s that constant checking to ensure that your infrastructure your assets have been patched, the appropriate controls are put in place, and any access to that data is constantly being checked,” explains Egoroff.

“You need a platform like ProcessUnity that allows you to interface with a lot of technologies out there and have everything in a single pane of glass to facilitate and make more efficient those processes to make sure you’re getting constant checks against all those various data points.”

Hackers on both sides of the conflict are getting involved—from independent to state-linked actors, individuals to larger collectives like Anonymous.

Western firms can be targets for voicing their opinion, offering assistance, suspending their operations, or simply due to their government’s support of one side. Egoroff believes the conflict has increased the global cybersecurity risk.

“It’s so easy now nowadays for anyone to either become a participant or a victim in this process,” says Egoroff.

Egoroff believes some comfort should be taken in the fact there’s now greater cybersecurity awareness from businesses and individuals.

“Everybody’s using MFA (Multi-Factor Authentication) for example, because a lot of these actors are out there using the existing traditional ways of getting into places like social engineering and phishing.”

However, Egoroff notes there’s been a huge increase in attacks against both the Russian and Ukraine side and that will inevitably bleed over into attacking Western companies and individuals.

NATO has been strategically ambiguous about what kind of cyberattack would trigger a collective response under Article 5, but the danger is certainly there. Much like all it could take to seriously escalate the conflict is one stray missile into NATO territory, all it could take is a cyberattack that spills over.

“If you take an example of the Russians accidentally, or on purpose, knocking out public services or power for a NATO-aligned country … if you consider the fact that cyber warfare can have detrimental effects – quite real tangible effects – then there’s no reason why it couldn’t escalate into a military response,” comments Egoroff.

Many security analysts predicted that a conflict with a powerful cyber actor like Russia would see it launch a major cyber offensive within hours, let alone days or weeks. We’ve seen many quite rudimentary DDoS attacks taking government websites and things offline, but not really the kind of attacks on critical infrastructure that many expected.

One potential explanation for the lack of such a major cyber offensive is the risk of spillover prompting a NATO response. We asked Egoroff if he believes that’s the case or whether modern cyber defenses are proving to be robust when quite literally battle-tested.

“I think it’s a combination of both. I think people generally are becoming more aware when there’s a heightened risk of attacks,” says Egoroff.

“From a government perspective, you know there’s certain controls and measures they need to put in place to protect against that but I think the nature of war is that a lot of these things that may be happening aren’t being particularly advertised.

“I think a lot of these actors on either side are attacking more government facilities or military facilities so by its very nature you’re not going to hear about that stuff anyway.”

Quite early on in the conflict, the Ukrainian government put out a statement warning civilians and soldiers about potential ‘deepfake’ videos. In the past week, a Ukrainian news website was hacked to post a deepfake video of President Zelenskyy calling on Ukrainians to “lay down arms”.

Fortunately, it was a poor deepfake and combined with the awareness campaign it probably didn’t fool anyone. However, it’s an example of how cybersecurity threats have evolved in the past few years alone.

One cybersecurity threat that remains the same is social engineering, especially over email. A report from Trend Micro released this week found that 75 percent of cyberattacks now start from email. 

“I’ve always said to all the sort of clients I work with that social engineering is hugely underestimated. You can put all the high tech firewalls and data loss prevention controls in place, but all it takes is an email and someone to intermittently pick a link or click a link opened up and you’ve compromised everything,” explains Egoroff.

“You’ll find that there’s a lot more sophisticated phishing and social engineering as in person-to-person type threats that happen—someone ringing up and coming across as a fake person from a company.”

Oh hi there 👋
It’s nice to meet you.

Sign up to receive awesome content in your inbox, every week.

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

You Might Also Like

Pokemon FireRed Coming to Nintendo Switch for Pokémon Day 2026

Mark Zuckerberg Testimony: Meta CEO Faces Jury in Landmark Child Addiction Trial

Pixel 10a Officially Unveiled at $499 Ahead of Apple’s Next iPhone

YouTube Down: Major Outage Disrupts Streaming for Thousands Across the U.S.

Apple Podcasts Video Update: Enhanced Video Experience Coming This Spring

Share This Article
Facebook LinkedIn Email Copy Link Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 93% of IT industry to adopt cloud tech within five years 93% of IT industry to adopt cloud tech within five years
Next Article Cloud-native adoption shifts security responsibilities across teams Cloud-native adoption shifts security responsibilities across teams

Latest News

  • The best e-reader to buy right now

    Any ebook reader will let you cram a Beauty and the Beast-sized library’s worth of books in your pocket, but so will your phone. An ebook reader offers a more book-like reading experience, with fewer distractions and less eye strain, and many include extra features, like adjustable frontlighting. Some really are pocketable. Others are waterproof

  • Xbox shakeup: Phil Spencer and Sarah Bond are leaving Microsoft

    After nearly 40 years at Microsoft, Xbox chief and Microsoft Gaming CEO Phil Spencer is leaving the company, along with Xbox president Sarah Bond. Spencer’s retirement was announced in a memo from Microsoft CEO Satya Nadella on February 20th, stating, “Last year, Phil Spencer made the decision to retire from the company, and since then

  • Microsoft says today’s Xbox shake-up doesn’t mean game studio layoffs

    Xbox has new leaders today, now that Phil Spencer and Sarah Bond are out - and you'd be forgiven for assuming that means yet another round of layoffs and shuttered studios, especially one day after Sony jettisoned a beloved developer. Not yet, it seems. "To be clear, there are no organizational changes underway for our

  • SCOTUS rules Trump’s tariffs are illegal — but the fight is far from over

    The US Supreme Court struck down some of Donald Trump's tariffs on foreign imports, which have become a hallmark of the chaos of the second Trump administration. The court's ruling deals specifically with duties levied using a law called the International Emergency Economic Powers Act (IEEPA), something no other president has done - the 1977

  • Read Microsoft gaming CEO Asha Sharma’s first memo on the future of Xbox

    Microsoft gaming boss Phil Spencer has just announced he's leaving the company after 12 years leading Xbox and nearly 40 at Microsoft in total. His replacement: Asha Sharma, formerly head of development for Microsoft's AI enterprise teams. Before that, she was COO of Instacart for three years, and spent four at Meta in charge of

- Advertisement -
about us

We influence 20 million users and is the number one business and technology news network on the planet.

Advertise

  • Advertise With Us
  • Newsletters
  • Partnerships
  • Brand Collaborations
  • Press Enquiries

Top Categories

  • Artificial Intelligence
  • Technology
  • Bussiness
  • Politics
  • Marketing
  • Science
  • Sports
  • White Paper

Legal

  • About Us
  • Contact Us
  • Privacy Policy
  • Affiliate Disclaimer
  • Legal

Find Us on Socials

The Tech MarketerThe Tech Marketer
© The Tech Marketer. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?