Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要观点。 文章开头提到日本成语“行雲流水”,用来形容企业在面对网络攻击时应具备的冷静、适应力和韧性。接着,2025年企业领导意识到数据泄露不再是IT问题,而是影响品牌、收入等的全局事件。董事会的角色也从预防转向提升应对能力。 然后,文章分析了2025年重大泄露事件的特点:速度快、隐蔽性强、技术高超。攻击者利用供应链、AI等手段,一旦突破防线,就能利用合法凭证横向移动造成破坏。MITRE框架中的技术显示攻击者如何滥用合法凭证。 接下来,文章讨论了如何遏制凭证滥用,建议采用零信任原则和无密码认证。最后强调微分段技术的重要性,指出其快速、无摩擦且可扩展的优势,并提到它与现有安全工具的整合。 总结下来,文章主要讲企业在2026年需具备的应对网络攻击的能力,包括零信任、微分段等技术的应用。 </think> 文章探讨了企业在2026年面对网络攻击时应具备的适应性和韧性,并强调了零信任原则和微分段技术在遏制攻击中的重要性。 2025-12-19 14:42:15 Author: securityboulevard.com(查看原文) 阅读量:1 收藏

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated disruptions. They are recurring tests of how well an organization can adapt without destabilizing the business. Organizations will need to move quickly, remain agile, and adapt continuously so that digital business remains largely unaffected when attacks occur, based on the breach readiness posture they have adopted.

When Breaches Became a Boardroom Reality

2025 was a period of great learning. Enterprise leadership came to terms with a hard truth. Breaches are no longer “IT problems.” They are enterprise-wide events that affect brand equity, revenue continuity, legal exposure, and customer trust. As a result, the board’s role has evolved. It is no longer about pushing the organization to prevent every attack. Instead, it is about ensuring the enterprise can continuously improve its ability to anticipate, contain, withstand, and recover from breaches within hours, not weeks.

This shift marked a fundamental change in how cyber risk is governed and measured at the highest levels of the organization.

The Defining Breach Pattern of 2025

This year’s most impactful breaches shared three defining characteristics: speed, stealth, and sophistication. Attackers frequently exploited human trust, software supply chains, and AI-powered automation. Despite increased investments in cybersecurity tools and operational capabilities, attacks did not slow down.

When we look closer, a consistent pattern emerges. Regardless of how attackers gained initial access, once they bypassed perimeter defenses, they relied on valid credentials and lateral movement to cause widespread damage. The entry point was rarely the real story. The ability to move freely inside the environment was. That freedom, once obtained, determined the scale and magnitude of impact.

Are You Breach Ready? Uncover hidden lateral attack risks in just 5 days. Get a free Breach Readiness Assessment with a visual roadmap of what to fix first.

The MITRE ATT&CK framework offers valuable insight into this behavior. Its tenth tactic outlines nine techniques adversaries use to gain and maintain remote access across networks. Achieving their objectives typically requires discovering the environment, identifying targets, and pivoting across systems and accounts. Two of these techniques, T1563 and T1021, expand into ten additional sub-techniques, many of which enable attackers to hijack or misuse legitimate credentials. Attackers increasingly appear to be trusted users once they are inside. This fundamentally changes how risk must be managed. Controls designed only to keep attackers out are no longer sufficient when the threat operates from within.

Stopping the Misuse of Legitimate Credentials

Curbing the misuse of valid credentials forces attackers to use other techniques for lateral movement. The world has always focused on provisioning access, and therefore, most organizations have identities provisioned for employees. However, this devalues the cybersecurity risks associated with credentials used by suppliers, partners, applications, and devices. As a result, most such identities often operate with persistent access and limited oversight.

Attackers have learned to exploit legitimate authentication mechanisms by harvesting Kerberos tickets, abusing NTLM, and escalating privileges through poorly monitored service accounts. The most common attack types, including credential stuffing, password cracking, phishing with MFA bypass, OAuth token abuse, and service account misuse, all exploit this trust gap.

Stopping credential misuse requires adopting cryptographic, passwordless authentication aligned with zero-trust principles because these credentials are associated with other parameters, denying attackers any leverage to misuse valid accounts. Enterprises that use these through a metric-driven identity controls program are successful in forcing attackers to use other techniques for lateral movement, all of which can be controlled by an efficient, managed microsegmentation program.

That Brings Us to Microsegmentation

The next step is denying attackers the ability to move laterally once initial defences have been bypassed. This is where NIST 800-207-recommended microsegmentation becomes essential, offering unprecedented capabilities to deny and defend against cyberattacks.

Microsegmentation enables enterprises to narrow down potential attack paths, allowing detection tools to identify malicious behaviour with fewer false positives. I have always believed in defining how attackers can reach critical systems, so that defenders can continuously protect, obfuscate and defend them. Microsegmentation does precisely that.

Access Report | ColorTokens Named a Leader in the Forrester Wave™ Microsegmentation Report

It reduces lateral movement to a minimum, making previously hidden activity visible. It allows organizations to define microsegments and interconnections that can be disconnected instantly to contain an attack without shutting down the business. It also enables continuous measurement and reduction of breach exposure while balancing user experience.

However, traditionally, microsegmentation has been the bane of network managers. It was considered a time-consuming initiative, taking months and years. That notion has changed in 2025. Since 2024, microsegmentation technology has been quietly evolving.

Today, microsegmentation is fast, frictionless, and scalable, and it integrates with existing cybersecurity investments.

Making Microsegmentation a Foundation for Breach Readiness

Simplicity in digital operations always drives the effectiveness of cybersecurity controls. Today, innovation in microsegmentation technology is making it easier to deploy and operate. The roadmap to breach readiness is defined as a progressive path that steadily and swiftly reduces breach exposure. Moreover, by tightly integrating it with existing cybersecurity investments, such as endpoint detection and response, network detection and response, vulnerability management, SIEM, and asset databases, friction is reduced in both steady-state operations and the management of active breaches.

By aligning microsegmentation enforcement with EDR telemetry and response workflows, today’s leading enterprises can swiftly adopt simplified incident decision-making to contain breaches. This approach helps address challenges across all industry verticals, from complex enterprise IT environments to regulated verticals, without forcing teams to replace existing tools or workflows. Enterprises must ensure breach-readiness workflows and organizational procedures are adequately exercised to shift the emphasis of CISOs from managing controls to making breach response easier in stressful breach management situations.

Breach Readiness as a Business Capability

Organizations that treated breach readiness as a core business competency, rather than a technical checkbox, were better positioned throughout the year. Breach readiness emerged not as a single initiative, but as the operational outcome of identity control, containment, and recovery working together. Establishing breach-readiness enablement through zero-trust enforcement became as much about operational preparedness as about technology. The goal was not perfect prevention but ensuring that critical business functions could remain operational even during active incidents.

The world has always known that the question is no longer whether a breach will occur. It is how quickly leaders will know which parts of the business are affected and which are not. As we look toward 2026, stakeholders will demand to know how companies were able to swiftly contain breaches and withstand the effects of spilling over into unmanageable material losses. The keyword for managing breaches in 2026 will be “unaffected” digital business.

Request a demo to see how ColorTokens works in your environment, or connect with a security advisor for tailored guidance.

The post Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026 appeared first on ColorTokens.

*** This is a Security Bloggers Network syndicated blog from ColorTokens authored by Agnidipta Sarkar. Read the original post at: https://colortokens.com/blogs/microsegmentation-breach-readiness-2026/


文章来源: https://securityboulevard.com/2025/12/containing-the-inevitable-what-cyber-leaders-must-prepare-for-in-2026/
如有侵权请联系:admin#unsafe.sh