• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

After the SolarWinds hack, we need contact tracing for our data

By
Doug Merritt
Doug Merritt
Down Arrow Button Icon
By
Doug Merritt
Doug Merritt
Down Arrow Button Icon
February 18, 2021, 12:30 PM ET
For security-conscious companies and organizations, writes Doug Merritt, “data contact tracing can dramatically reduce the time it takes to discover how far into their networks an attacker has penetrated.”
For security-conscious companies and organizations, writes Doug Merritt, “data contact tracing can dramatically reduce the time it takes to discover how far into their networks an attacker has penetrated.”Getty Images

The ramifications of the SolarWinds hack will plague affected organizations for months, if not years. 

Since the December revelation that thousands of organizations may have been compromised by a SolarWinds software update containing Russian malware, security experts have worked overtime to identify and remediate any breach. This has meant everything from updating the infected SolarWinds software (or removing it entirely), to checking data logs to detect any intrusion or lateral movement across a company’s IT environment, to even perhaps executing full third-party software code reviews.

While the attack on SolarWinds software is arguably the most significant state-sponsored hack we’ve seen in years, it’s more than an isolated incident. It is emblematic of a constant reality of the digital era: We’re all likely to get hacked at some point. Our ability to respond determines our ability to operate. Digital security is now a broad governance imperative. 

Organizations of all types must be able to defend against attacks. Yet 2020 research from the Ponemon Institute, conducted in partnership with IBM, found that on average it takes a company 207 days to identify that a breach has occurred, and another 73 days to contain it. 

Whether a cyberattack is motivated toward sabotage or data theft, a victim’s fundamental questions are, “Who has accessed our data? Which data, when, and why?” In other words, the ability to trace all contact with sensitive data is vital. But most companies today cannot do this.

Contact tracing is an epidemiological technique that we’ve all heard a lot about in the past year. Because COVID-19 is spread by human contact, we look at where an infected person has been, and whose paths they’ve crossed, during the infectious period. On the human scale, we’ve seen mixed results worldwide. But applied to digital systems, contact tracing could become a powerful security technique.

This idea is not new. A concept called Sightings has been gaining traction in the security community, largely at the academic level, for the past few years. The idea is for organizations to be able to share details of how they were attacked and what was targeted—the who, what, and when—as quickly as possible with other organizations. 

This concept could help organizations identify breaches sooner and remediate faster and more effectively. Through sharing, attack techniques could be more thoroughly understood, and with the right reporting mechanism, the resulting threat intelligence could be shared to help more organizations avoid a breach in the first place. MITRE, a leading not-for-profit research organization, is working on incorporating Sightings concepts into a security reporting process that would let breach victims share appropriate data in a secure, anonymized way to benefit the wider community.

Beyond this threat intelligence application, organizations could use this sort of contact tracing approach for their own internal investigations. Data contact tracing can dramatically reduce the time it takes to discover how far into their networks an attacker has penetrated, and identify where related systems in their supply chains, customers, and partner networks have also been compromised.

While remediation of compromised systems will vary based on the specific hack, data contact tracing could dramatically shrink the “dwell time”—the period between detection of an attack or compromised system and notification to the world. With the right technologies and techniques, detection could be measured in hours, if not minutes, as opposed to months. Similar to sharing virus data between governments, sharing data between organizations could help stamp out major threats, including ransomware and nation-state attacks.

The world’s scientific community did astonishing work in 2020, compressing what’s typically an eight-year process into just 10 months to develop new COVID-19 vaccines. Now we need a similar marshaling of commitment and resources for data contact tracing, to improve breach response and reporting actionable threat intelligence to the wider IT community. 

While such a vision would require broad cooperation across multiple industries and sectors, the first steps are ones that each company can take for itself immediately and begin with a few simple questions. Those questions include: Within our organizations, can we see how and when every data file is touched? Can we identify the digital trails that data users, authorized or not, leave through our systems? Can we ensure that our software supply chains are sound, and that we are aware of the source and history of every line of code contributed by our developers? When a breach or other anomalous activity is discovered, how quickly can we trace the behavior and identify where access occurred and what data has been compromised?

The technology exists to contact-trace our data and to automate the real-time extraction of insights. It’s used for many things today, from managing IT, software development, and operations to improving customer experience. My own company is involved in helping clients with efforts like these. If we can take smart action on those insights in real time, we should be able to put the same focus and velocity behind protecting our data.

Doug Merritt is the president and CEO of Splunk. Previously, he held senior leadership roles across a wide range of disciplines, including product, sales, marketing, and HR, for companies including Cisco, SAP, and PeopleSoft.

About the Author
By Doug Merritt
See full bioRight Arrow Button Icon

Latest in Commentary

Julian Braithwaite is the Director General of the International Alliance for Responsible Drinking
CommentaryProductivity
Gen Z is drinking 20% less than Millennials. Productivity is rising. Coincidence? Not quite
By Julian BraithwaiteDecember 13, 2025
1 hour ago
carbon
Commentaryclimate change
Banking on carbon markets 2.0: why financial institutions should engage with carbon credits
By Usha Rao-MonariDecember 13, 2025
2 hours ago
Dr. Javier Cárdenas is the director of the Rockefeller Neuroscience Institute NeuroPerformance Innovation Center.
Commentaryconcussions
Fists, not football: There is no concussion protocol for domestic violence survivors
By Javier CárdenasDecember 12, 2025
1 day ago
Gary Locke is the former U.S. ambassador to China, U.S. secretary of commerce, and governor of Washington.
CommentaryChina
China is winning the biotech race. Patent reform is how we catch up
By Gary LockeDecember 12, 2025
1 day ago
millennial
CommentaryConsumer Spending
Meet the 2025 holiday white whale: the millennial dad spending $500+ per kid
By Phillip GoerickeDecember 12, 2025
1 day ago
Sarandos
CommentaryAntitrust
Netflix, Warner, Paramount and antitrust: Entertainment megadeal’s outcome must follow the evidence, not politics or fear of integration
By Satya MararDecember 12, 2025
1 day ago

Most Popular

placeholder alt text
Economy
Tariffs are taxes and they were used to finance the federal government until the 1913 income tax. A top economist breaks it down
By Kent JonesDecember 12, 2025
1 day ago
placeholder alt text
Success
Apple cofounder Ronald Wayne sold his 10% stake for $800 in 1976—today it’d be worth up to $400 billion
By Preston ForeDecember 12, 2025
1 day ago
placeholder alt text
Success
40% of Stanford undergrads receive disability accommodations—but it’s become a college-wide phenomenon as Gen Z try to succeed in the current climate
By Preston ForeDecember 12, 2025
24 hours ago
placeholder alt text
Economy
For the first time since Trump’s tariff rollout, import tax revenue has fallen, threatening his lofty plans to slash the $38 trillion national debt
By Sasha RogelbergDecember 12, 2025
20 hours ago
placeholder alt text
Economy
The Fed just ‘Trump-proofed’ itself with a unanimous move to preempt a potential leadership shake-up
By Jason MaDecember 12, 2025
18 hours ago
placeholder alt text
Success
At 18, doctors gave him three hours to live. He played video games from his hospital bed—and now, he’s built a $10 million-a-year video game studio
By Preston ForeDecember 10, 2025
3 days ago
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Fortune Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.