This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks.
Simplicity Across Clouds Is Rare
91% of executives are looking to improve “consistency across [their] public cloud environments."
Applications Need to Be Modernized
68% of developers want to expand use of modern application frameworks, APIs and services.
Distributed Work Models Are Here to Stay
72% of enterprise employees are working from non-traditional environments.
Security Is a Top-Down Concern
Risk related to security, data and privacy issues remains the #1 multi-cloud challenge.
Give developers the flexibility to use any app framework and tooling for a secure, consistent and fast path to production on any cloud.
Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud.
Operate apps and infrastructure consistently, with unified governance and visibility into performance and costs across clouds.
Empower your employees to be productive from anywhere, with secure, frictionless access to enterprise apps from any device.
Run enterprise apps and platform services at scale across public and telco clouds, data centers and edge environments.
Get on a Faster Path to Prod
Build and deploy quickly and securely on any public cloud or on-premises Kubernetes cluster.
Simplify Kubernetes Operations
Build and operate a secure, multi-cloud container infrastructure at scale.
Pair with App Development Experts
Unlock value by modernizing your existing apps and building innovative new products.
Build, run, secure, and manage all of your apps across any cloud with application modernization solutions and guidance from VMware.
11 Security Practices to Manage Container Lifecycle
Get recommended practices for DevSecOps teams that desire a more modern app methodology.
Scale Your Business & Innovate
Secure, run, and manage modern apps at scale, across clouds with consistent operations, higher speed, and reduced risks.
Accelerate Cloud Transformation
Modernize infrastructure, ops and apps to reduce cross-cloud complexity, lower costs, and improve security.
Empower a Hybrid Workforce
Enable anywhere work with broad effective security, a frictionless employee experience, and reduced cost and complexity.
Run enterprise apps at scale with a consistent cloud infrastructure across public clouds, data centers and edge environments.
VMware Research: Multi-Cloud Strategies
Learn why enterprises find multi-cloud strategies critical for success.
Deliver an Engaging Experience
Put employees first with device choice, flexibility, and seamless, consistent, high-quality experiences.
Secure Today’s Anywhere Workspace
Ease the move to Zero Trust with situational intelligence and connected control points.
Automate the Workspace
Manage to outcomes — not tasks — with intelligent compliance, workflow and performance management.
Enable any employee to work from anywhere, anytime with seamless employee experiences.
Remote Work Is No Longer Optional
Shift from supporting remote work to becoming an anywhere organization.
Secure & Connect Workloads
Operationalize consistent security and networking across apps, users, and entities with transparency built into our tools.
Protect APIs — the New Endpoints
Increase app velocity and centrally manage, secure, connect, and govern your clusters no matter where they reside.
Be Future-Ready
Get built-in threat intelligence spanning users, endpoints and networks to evolve your protection in a dynamic landscape.
Deliver security and networking as a built-in distributed service across users, apps, devices, and workloads in any cloud.
Protect Your Multi-Cloud Environments
Discover the unique characteristics of malware and how to stay ahead of attacks.
Work with a VMware Partner
Partners deliver outcomes with their expertise and VMware technology, creating exceptional value for our mutual customers.
Become a Partner
Together with our partners, VMware is building the new multi-cloud ecosystem positioned to become essential to our customers.
With thousands of partners worldwide, we are positioned to help customers scale their business, drive innovation and transform their customer experience.
Working Together with Partners for Customer Success
See how we work with a global partner to help companies prepare for multi-cloud.
Explore the tactics, techniques and procedures (TTPs) of these groups over the years as well as predictions on the subsequent evolution of their operations in 2021 and beyond.
Last December, the security industry was stunned by the magnitude and sophistication of the SolarWinds breach. Today, efforts are still underway to assess the impact of the more than seven-month-old cyberespionage campaign. In January, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigations (FBI), the Office of the Director National Intelligence (ODNI), and the National Security Agency (NSA) issued a joint statement announcing the plan to coordinate the investigation and remediation of the SolarWinds attack, which they cited as a significant cyber incident involving federal government networks. While the agencies work to understand the scope of the incident, the current investigative and mitigation efforts conclude.
1. Leverage a single sign-on (SSO) provider to allow for centralized and seamless authentication across the vastly distributed work environment.
2. Apply micro-segmentation. Limit an adversary’s ability to move laterally within the organization. Forcing intruders to cross trust boundaries provides an improved opportunity for detection and prevention.
3. Segment personal and professional networks. Amid COVID-19, the corporate perimeter has expanded in employee homes, ushering in a deluge of new focus toward on-home routers and networks, which is only made more challenging with the lack of visibility security professionals have into those networks (especially while they, too, work from home).
This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks.
Going forward, we anticipate that these threat actors will escalate their attacks against the west, following ongoing testing and validation of tactics across Ukraine.26 A new administration also changes the threat landscape as we consider support of the North Atlantic Treaty Organization (NATO). As the U.S. and its allies attempt to contain the threat posed by the regime, cyberattacks and the use of proxies may grow. This reality forces all organizations—private and public sectors— to take a forward-leaning approach to cybersecurity. Organizations should look to subscribe to Zero Trust architectures that extend across their infrastructure intrinsically to suppress these threat actors.
“As cybercriminals continue to evolve and develop increasingly sophisticated methods of attack, law enforcement is likewise sharpening our investigative approaches necessary to arrest and convict these criminals,” said David Smith, special agent in charge of the Criminal Division, U.S. Secret Service. “While criminal methods may change as technology advances, we must never forget that no matter how sophisticated criminals may become, they are human, and humans make mistakes. Law enforcement will always be there to exploit those mistakes.”
* All fields are required.