Given Israel’s ranking as the world leader for cyber-security by Switzerland’s International Institute for Management Development in their 2013 World Competitiveness Yearbook, I spoke to two of Israel’s preeminent cyber-security entrepreneurs, ThetaRay chief executive Mark Gazit, and Jerusalem Venture Partners partner Yoav Tzruya, to learn more about the growing threat of cyber-espionage, and available countermeasures to protect America’s critical infrastructures. I met with them at The Israel Conference, which took place last week at L.A.’s Luxe Hotel.
[aditude-amp id="flyingcarpet" targeting='{"env":"staging","page_type":"article","post_id":749704,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"big-data,entrepreneur,security,","session":"A"}']Funded by Tzruya’s JVP, ThetaRay is a cyber-security firm that uses “extremely big data” to protect financial institutions and critical infrastructure, like nuclear plants and transportation systems, from “strategic, high-level” cyber attacks, according to Gazit. Tzruya said these attacks have direct and indirect costs of $100 billion and $400 billion a year, respectively.
Wearing satellite cufflinks, Gazit emphasized that while computer virus behavior is easy to identify, the modern cyber-security professional has to be prepared to combat a much more insidious threat: the so-called “zero-day exploit.”
AI Weekly
The must-read newsletter for AI and Big Data industry written by Khari Johnson, Kyle Wiggers, and Seth Colaner.
Included with VentureBeat Insider and VentureBeat VIP memberships.
A zero-day exploit is an attack that targets an undiscovered flaw in a software program and then implants malicious code into the application, which gives the hacker access to the selected user’s privileged information. Zero-day attacks are especially problematic because each one is unique and tailored to exploit a specific software vulnerability, making them more difficult to detect.
“It’s like looking for a needle in a huge haystack, and you don’t even know what the needle looks like,” said Gazit.
The infamous Stuxnet attack on Iran’s nuclear program incorporated four different zero-day attacks, for example. Also, this past April, researchers discovered that a vulnerability in Internet Explorer 8, had allowed hackers to launch a zero-day attack on the U.S. Department of Labor website, targeting employees with access to sensitive information about nuclear technologies.
Tzruya says that hackers sell their zero-day exploits on the black market through “Darknets,” or anonymous networks of computers where IP addresses are never revealed, at costs ranging anywhere from $50,000 to $250,000 per program, by his estimates. The market for these cyber-weapons includes rogue nation-states, terrorist groups, and crime syndicates, he said.
“If you want to take down your competitor’s website, you can do that today for hundreds of dollars,” he added.
Tzruya also highlighted the recent Liberty Reserve virtual-currency-money- laundering scandal to illustrate how Darknet forums can enable cyber-criminals to execute “monetary and non-monetary transactions.”
[aditude-amp id="medium1" targeting='{"env":"staging","page_type":"article","post_id":749704,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"big-data,entrepreneur,security,","session":"A"}']
“But how do you turn virtual currency into real currency?”
“You have a partner in a non-regulated market, like a country that is less regulated than the U.S. domestic market, and they actually turn the virtual currency into money for a commission.”
The conversation shifted back to ThetaRay and I asked both men how the company identifies cyber-attacks. Tzruya said that they detect threats by first determining the “layer of the network,” which can be TCP- or-IP-based. Then the security expert must track where the attack originated and the amount of data delivered through the exchange. The problem is, he said, that more sophisticated attackers are aware of standardized defensive mechanisms.
Ultimately, to properly secure an organization’s network, Tzruya asserts that the security application must sample “thousands of parameters on a millisecond level” to establish a clear picture of the system’s normal processes. By identifying normal operations, the scan is then able to isolate even the slightest operational anomaly, which typically indicates the presence of a cyber-attack.
[aditude-amp id="medium2" targeting='{"env":"staging","page_type":"article","post_id":749704,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"big-data,entrepreneur,security,","session":"A"}']
He compared ThetaRay’s algorithms to the ones used by governments to monitor telecom networks for the task of identifying terrorist cell communications.
I asked Gazit if ThetaRay had any American customers. “We don’t disclose customers or the methods we use to protect our customers,” he said. Tzruya said details about ThetaRay’s funding are also confidential.
With $900 million in assets under management, JVP is one of Israel’s preeminent venture capital firms, according to Tzruya. Alternative asset research company Preqin ranks JVP as one of the top 10 venture capital funds in the world. Last month, JVP launched Israel’s first cyber-security incubator in Beer Sheeva, right next to the Israel Defense Forces Telecommunications Division’s new campus.
Yoav Tzruya (top) and Mark Gazit images courtesy Jerusalem Venture Partners.
[aditude-amp id="medium3" targeting='{"env":"staging","page_type":"article","post_id":749704,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"big-data,entrepreneur,security,","session":"A"}']
[Top image credit: Maksim Kabakou/Shutterstock]
VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More