{"id":24835,"date":"2022-08-10T21:13:06","date_gmt":"2022-08-10T21:13:06","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=24835"},"modified":"2022-08-10T21:13:08","modified_gmt":"2022-08-10T21:13:08","slug":"zero-trust-ransomware-test","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/","title":{"rendered":"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds"},"content":{"rendered":"\n<p>From mass production of cheap <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware as a service (RaaS)<\/a>, cyber criminals have industrialized cybercrime, and a new <a href=\"https:\/\/threatresearch.ext.hp.com\/evolution-of-cybercrime-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">HP Wolf Security report<\/a> warns that cybercriminals are adapting <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">advanced persistent threat (APT)<\/a> tactics too. That means hackers will increasingly mimic nation-state threat groups by establishing a long-term presence inside networks to mine highly sensitive data.<\/p>\n\n\n\n<p>Additionally, attacks are poised to become even more damaging as companies expand their digital footprint and the attack surface grows. This is one reason organizations across industries and geographies are turning to <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero-trust architectures<\/a> to fortify their security posture.<\/p>\n\n\n\n<p>Zero trust implies that every access and connection made to a point of the network is reevaluated and re-authenticated to ensure the user and connection are authorized, with no more access than the user&#8217;s role requires.<\/p>\n\n\n\n<p>But how effective is zero trust? That&#8217;s an especially important question given the recent emphasis on the technology &#8211; including from <a href=\"https:\/\/www.esecurityplanet.com\/networks\/white-house-zero-trust-cybersecurity-strategy\/\">the White House<\/a>.<\/p>\n\n\n\n<p>To answer that question, <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/illumio-cloudsecure-zero-trust-segmentation\/\">Illumio<\/a>, a zero trust <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">segmentation<\/a> (ZTS) vendor, engaged Bishop Fox, a leader in offensive security, to measure how effective zero trust is in detecting and containing ransomware attacks. The company put its zero trust solutions to the test by simulating attacks based on real threat actors\u2019 tactics, techniques, and procedures. The results were announced today at the Black Hat USA 2022 cybersecurity conference.<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero Trust Security Testing<\/h2>\n\n\n\n<p>Bishop Fox\u2019s report found that Illumio&#8217;s zero trust segmentation technology \u201csignificantly improves an organization\u2019s ability to detect, contain, and proactively limit the available attack surface.\u201d ZTS can also be applied to effectively isolate compromised hosts during an active attack, the report said.<\/p>\n\n\n\n<p>Bishop Fox ran four ransomware scenario attacks, a control test with no Illumio ZTS deployed; detection and response; pre-configured static protection; and full application ring-fencing with ZTS. They found that the stricter ZTS is, the faster security teams can detect and stop an ongoing attack.<\/p>\n\n\n\n<p>The attack simulations where no ZTS was deployed breached and compromised the system in 2.5 hours. On the other hand, in the simulation with full app ring-fencing policies enforced, the attack was detected and stopped in just 10 minutes.<\/p>\n\n\n\n<p>\u201cZTS can be used in a proactive fashion to ring-fence entire environments and applications, drastically reducing the pathways available for exploit through lateral movement,\u201d Bishop Fox said.<\/p>\n\n\n\n<p>The other two simulation scenarios also showed that the zero trust protections were superior. Attacks simulated with preconfigured static protection were stopped in 24 minutes, and those with detection and response were blocked in 38 minutes.<\/p>\n\n\n\n<p>\u201cIf an organization chooses to invest in zero-trust strategies, including zero trust segmentation, it will find that, compared to an environment that simply implements a detection and response approach, the organization is four times faster to contain a bad actor and minimize the impact of a breach,\u201d said Raghu Nandakumara, head of industry solutions at Illumio.<\/p>\n\n\n\n<p>The report also found that ZTS can play a critical role in covering <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint detection and response (EDR)<\/a> blind spots. EDR gains visibility on what\u2019s happening on an organization\u2019s endpoints by capturing activity data. However, organizations are learning the hard way that cyber criminals commonly use EDR blind spots.<\/p>\n\n\n\n<p>Bishop Fox\u2019s report assures that in terms of data collection, they found Illumio\u2019s telemetry to be especially useful to cover some EDR blind spots, where the preconfigured EDR alerts did not properly detect attacker activities.<\/p>\n\n\n\n<p>\u201cIn a particular scenario where the red team performed more evasive maneuvers, Bishop Fox properly identified a suspicious traffic pattern using Illumio\u2019s telemetry combined with EDR alerts,\u201d Bishop Fox said.<\/p>\n\n\n\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/how-to-tune-edr\/\">Why You Need to Tune EDR to Secure Your Environment<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware: Breach and Attack Simulations<\/h2>\n\n\n\n<p>To assess Illumio ZTS, Bishop Fox\u2019s assessment team chose an infrastructure-as-code solution. The environment was based on the <a href=\"https:\/\/github.com\/splunk\/attack_range&amp;sa=D&amp;source=docs&amp;ust=1659727110385520&amp;usg=AOvVaw3ZiVmGg8b_fYmdgNec3cr-x\" target=\"_blank\" rel=\"noreferrer noopener\">Splunk Attack Range<\/a> open-source project but modified to include more hosts and to deploy a more complete <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Active Directory<\/a> configuration.<\/p>\n\n\n\n<p>The test environment was made of the following resources:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Five Windows Server 2019 instances representing hosts in a corporate network<\/li><li>Five Windows Server 2019 instances representing hosts in a staging network<\/li><li>Five Windows Server 2019 instances representing hosts in a production network<\/li><li>One Windows Server 2019 acting as a domain controller<\/li><li>One Ubuntu 18.04 server running a Splunk server<\/li><\/ul>\n\n\n\n<p>All Windows instances ran a Splunk Universal Forwarder agent and a System Monitor (Sysmon) service configured with the default Splunk Attack range configuration. These instances were also deployed with the default configuration of Nextron Systems\u2019 Aurora EDR agent, including the default set of Sigma rules.<\/p>\n\n\n\n<p>All Windows hosts had the following remote administrative services enabled:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows Remote Management (WinRM)<\/li><li>Remote Desktop Protocol (<a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\">RDP<\/a>)<\/li><\/ul>\n\n\n\n<p>The Illumio VEN agent was installed during instance provisioning on top of that configuration.<\/p>\n\n\n\n<p>The Bishop Fox team based their attack techniques on real-world attacks, creating playbooks from active known ransomware threats groups such as Conti. The attack aimed to identify available assets, execute lateral movement, and escalate privileges within the system to finally deploy the ransomware across the domain-joined systems.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full td-caption-align-center\"><img loading=\"lazy\" decoding=\"async\" width=\"783\" height=\"389\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg\" alt=\"\" class=\"wp-image-24838\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg 783w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test-300x149.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test-768x382.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test-150x75.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test-696x346.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test-324x160.jpg 324w\" sizes=\"(max-width: 783px) 100vw, 783px\" \/><figcaption>Group Policy Discover, Simulation Attack Scenario 1: No ZTS deployed<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Full Application Ring-fencing Attack Simulation<\/h2>\n\n\n\n<p>The fourth scenario \u2014 full ring attack simulation \u2014 showed the most effective results in time to identify and stop a ransomware attack, accomplishing these milestones in just 10 minutes.<\/p>\n\n\n\n<p>In the scenario used, the microsegmentation policy consisted of the following rules:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Database workloads in one environment could not connect to other environments.<\/li><li>API workloads in one environment could not connect to other environments.<\/li><li>The Jump host workload from the Corporate environment could access every host in the Staging environment using RDP.<\/li><li>The Jump host workload from the Staging environment could access every host in the Production environment using RDP.<\/li><li>Every workload could communicate with the domain controller.<\/li><li>Every workload could access public SMB shares in all environments.<\/li><li>Every workload could communicate to the internet on the following ports:<ul><li>443\/TCP<\/li><li>80\/TCP<\/li><li>53\/TCP<\/li><li>53\/UDP<\/li><li>123\/UDP<\/li><\/ul><\/li><li>RDP access was authorized from the internet to <a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\">API<\/a> workloads in the Corporate network as an entry point for the attacker.<\/li><\/ul>\n\n\n\n<p>The red team, simulating the attack, started by connecting to corp-win-serv-0 using the CORPADMIN account. The team then uploaded a Sliver agent to C:\\ProgramData\\Amazon and executed it. Once Microsoft Defender detected the initial payload, the team modified Defender to allow the binary and re-executed the payload.<\/p>\n\n\n\n<p>\u201cAfter waiting several minutes for a C2 callback and fallback connection methods to execute, the red team still had no established session with the Silver agent, indicating additional segmentation had been enforced,\u201d the report explained.<\/p>\n\n\n\n<p>The red team followed methodology without a C2 agent and began local host enumeration using a Windows command prompt to enumerate running processes, as shown below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"401\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/08\/zero-trust-test-1024x401.jpg\" alt=\"\" class=\"wp-image-24836\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-test-1024x401.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-test-300x118.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-test-768x301.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-test-150x59.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-test-696x273.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-test-1068x419.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-test.jpg 1439w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The team continued the discovery process and identified the password policies in place, along with local user accounts on the machine, before losing the RDP session due to blue team countermeasures. The entire simulation ended 10 minutes after it started.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Importance of Real Threat Simulations<\/h2>\n\n\n\n<p>The Bishop Fox assessment of Illumio revealed in detail how running simulation attacks can enlighten the industry on the capabilities of zero trust segmentation.<\/p>\n\n\n\n<p>However, the assessment did have some limitations:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The number of and style of attacks evaluated was limited.<\/li><li>Technical settings and rules of attacks, environment, and microsegmentation policies.<\/li><li>The environment representing hosts was a Windows-only environment.<\/li><li>Only two Bishop Fox consultants engaged in the simulations: One acting as the attacker (red team) and the other acting as the security team defending the system (blue team).<\/li><\/ul>\n\n\n\n<p>Despite these limitations, the assessment is a big step in the right direction. Putting zero-trust security to the test with real attack simulations is often considered the ultimate cybersecurity defense.<\/p>\n\n\n\n<p>These simulations can help organizations stay one step ahead of cyber criminals. Running simulated attacks can level-up security as malware evolves and the attack surface expands with the never-ending digital transformation.<\/p>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-hype-vs-reality\/\">Zero Trust: Hype vs. Reality<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6eb9c3c979-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6eb9c3c979\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6eb9c3c979\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6eb9c3c979\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6eb9c3c979\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6eb9c3c979\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6eb9c3c979\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>From mass production of cheap malware to ransomware as a service (RaaS), cyber criminals have industrialized cybercrime, and a new HP Wolf Security report warns that cybercriminals are adapting advanced persistent threat (APT) tactics too. That means hackers will increasingly mimic nation-state threat groups by establishing a long-term presence inside networks to mine highly sensitive [&hellip;]<\/p>\n","protected":false},"author":293,"featured_media":24838,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[3790,1146,23887,3414,2478,730,11190,5277,30581],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788,403,378,395,404,31790],"class_list":["post-24835","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cybersecurity","tag-malware","tag-microsegmentation","tag-network-security","tag-ransomware","tag-security","tag-security-testing","tag-web-security","tag-zero-trust-security","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats","b2b_product-cyber-terrorists-and-cyber-crime","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-hackers","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Research unveiled at Black Hat showed that zero trust microsegmentation significantly improved ransomware response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Research unveiled at Black Hat showed that zero trust microsegmentation significantly improved ransomware response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-10T21:13:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-10T21:13:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"783\" \/>\n\t<meta property=\"og:image:height\" content=\"389\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ray Fernandez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ray Fernandez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/\"},\"author\":{\"name\":\"Ray Fernandez\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422\"},\"headline\":\"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds\",\"datePublished\":\"2022-08-10T21:13:06+00:00\",\"dateModified\":\"2022-08-10T21:13:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/\"},\"wordCount\":1316,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg\",\"keywords\":[\"cybersecurity\",\"malware\",\"microsegmentation\",\"network security\",\"ransomware\",\"security\",\"Security Testing\",\"Web security\",\"zero trust security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/\",\"name\":\"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg\",\"datePublished\":\"2022-08-10T21:13:06+00:00\",\"dateModified\":\"2022-08-10T21:13:08+00:00\",\"description\":\"Research unveiled at Black Hat showed that zero trust microsegmentation significantly improved ransomware response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg\",\"width\":783,\"height\":389,\"caption\":\"zero trust test\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422\",\"name\":\"Ray Fernandez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg\",\"caption\":\"Ray Fernandez\"},\"description\":\"Ray is a Content and Communication Specialist with more than 10 years of experience. He currently works as a Senior Copywriter for Wunderman Thompson and writes as a freelance technology journalist for several tech media. His work has been published in Microsoft, Slash Gear, Screen Rant, OOSKA News, Bloomberg, and Nature Conservancy, among other places.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/rfernandez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds | eSecurity Planet","description":"Research unveiled at Black Hat showed that zero trust microsegmentation significantly improved ransomware response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds | eSecurity Planet","og_description":"Research unveiled at Black Hat showed that zero trust microsegmentation significantly improved ransomware response.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/","og_site_name":"eSecurity Planet","article_published_time":"2022-08-10T21:13:06+00:00","article_modified_time":"2022-08-10T21:13:08+00:00","og_image":[{"width":783,"height":389,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg","type":"image\/jpeg"}],"author":"Ray Fernandez","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Ray Fernandez","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/"},"author":{"name":"Ray Fernandez","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422"},"headline":"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds","datePublished":"2022-08-10T21:13:06+00:00","dateModified":"2022-08-10T21:13:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/"},"wordCount":1316,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg","keywords":["cybersecurity","malware","microsegmentation","network security","ransomware","security","Security Testing","Web security","zero trust security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/","url":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/","name":"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg","datePublished":"2022-08-10T21:13:06+00:00","dateModified":"2022-08-10T21:13:08+00:00","description":"Research unveiled at Black Hat showed that zero trust microsegmentation significantly improved ransomware response.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/08\/zero-trust-ransomware-test.jpg","width":783,"height":389,"caption":"zero trust test"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-ransomware-test\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422","name":"Ray Fernandez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg","caption":"Ray Fernandez"},"description":"Ray is a Content and Communication Specialist with more than 10 years of experience. He currently works as a Senior Copywriter for Wunderman Thompson and writes as a freelance technology journalist for several tech media. His work has been published in Microsoft, Slash Gear, Screen Rant, OOSKA News, Bloomberg, and Nature Conservancy, among other places.","url":"https:\/\/www.esecurityplanet.com\/author\/rfernandez\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/24835"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/293"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=24835"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/24835\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/24838"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=24835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=24835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=24835"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=24835"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=24835"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=24835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}