• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
CommentaryCybersecurity

After the SolarWinds hack, we need contact tracing for our data

By
Doug Merritt
Doug Merritt
Down Arrow Button Icon
By
Doug Merritt
Doug Merritt
Down Arrow Button Icon
February 18, 2021, 12:30 PM ET
For security-conscious companies and organizations, writes Doug Merritt, “data contact tracing can dramatically reduce the time it takes to discover how far into their networks an attacker has penetrated.”
For security-conscious companies and organizations, writes Doug Merritt, “data contact tracing can dramatically reduce the time it takes to discover how far into their networks an attacker has penetrated.”Getty Images

The ramifications of the SolarWinds hack will plague affected organizations for months, if not years. 

Since the December revelation that thousands of organizations may have been compromised by a SolarWinds software update containing Russian malware, security experts have worked overtime to identify and remediate any breach. This has meant everything from updating the infected SolarWinds software (or removing it entirely), to checking data logs to detect any intrusion or lateral movement across a company’s IT environment, to even perhaps executing full third-party software code reviews.

While the attack on SolarWinds software is arguably the most significant state-sponsored hack we’ve seen in years, it’s more than an isolated incident. It is emblematic of a constant reality of the digital era: We’re all likely to get hacked at some point. Our ability to respond determines our ability to operate. Digital security is now a broad governance imperative. 

Organizations of all types must be able to defend against attacks. Yet 2020 research from the Ponemon Institute, conducted in partnership with IBM, found that on average it takes a company 207 days to identify that a breach has occurred, and another 73 days to contain it. 

Whether a cyberattack is motivated toward sabotage or data theft, a victim’s fundamental questions are, “Who has accessed our data? Which data, when, and why?” In other words, the ability to trace all contact with sensitive data is vital. But most companies today cannot do this.

Contact tracing is an epidemiological technique that we’ve all heard a lot about in the past year. Because COVID-19 is spread by human contact, we look at where an infected person has been, and whose paths they’ve crossed, during the infectious period. On the human scale, we’ve seen mixed results worldwide. But applied to digital systems, contact tracing could become a powerful security technique.

This idea is not new. A concept called Sightings has been gaining traction in the security community, largely at the academic level, for the past few years. The idea is for organizations to be able to share details of how they were attacked and what was targeted—the who, what, and when—as quickly as possible with other organizations. 

This concept could help organizations identify breaches sooner and remediate faster and more effectively. Through sharing, attack techniques could be more thoroughly understood, and with the right reporting mechanism, the resulting threat intelligence could be shared to help more organizations avoid a breach in the first place. MITRE, a leading not-for-profit research organization, is working on incorporating Sightings concepts into a security reporting process that would let breach victims share appropriate data in a secure, anonymized way to benefit the wider community.

Beyond this threat intelligence application, organizations could use this sort of contact tracing approach for their own internal investigations. Data contact tracing can dramatically reduce the time it takes to discover how far into their networks an attacker has penetrated, and identify where related systems in their supply chains, customers, and partner networks have also been compromised.

While remediation of compromised systems will vary based on the specific hack, data contact tracing could dramatically shrink the “dwell time”—the period between detection of an attack or compromised system and notification to the world. With the right technologies and techniques, detection could be measured in hours, if not minutes, as opposed to months. Similar to sharing virus data between governments, sharing data between organizations could help stamp out major threats, including ransomware and nation-state attacks.

The world’s scientific community did astonishing work in 2020, compressing what’s typically an eight-year process into just 10 months to develop new COVID-19 vaccines. Now we need a similar marshaling of commitment and resources for data contact tracing, to improve breach response and reporting actionable threat intelligence to the wider IT community. 

While such a vision would require broad cooperation across multiple industries and sectors, the first steps are ones that each company can take for itself immediately and begin with a few simple questions. Those questions include: Within our organizations, can we see how and when every data file is touched? Can we identify the digital trails that data users, authorized or not, leave through our systems? Can we ensure that our software supply chains are sound, and that we are aware of the source and history of every line of code contributed by our developers? When a breach or other anomalous activity is discovered, how quickly can we trace the behavior and identify where access occurred and what data has been compromised?

The technology exists to contact-trace our data and to automate the real-time extraction of insights. It’s used for many things today, from managing IT, software development, and operations to improving customer experience. My own company is involved in helping clients with efforts like these. If we can take smart action on those insights in real time, we should be able to put the same focus and velocity behind protecting our data.

Doug Merritt is the president and CEO of Splunk. Previously, he held senior leadership roles across a wide range of disciplines, including product, sales, marketing, and HR, for companies including Cisco, SAP, and PeopleSoft.

About the Author
By Doug Merritt
See full bioRight Arrow Button Icon

Latest in Commentary

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Commentary

kennnedy
CommentaryDrugs
America is handing its mRNA lead to China—and RFK Jr. is to blame
By Jeff CollerMarch 26, 2026
3 hours ago
jerry
CommentaryEducation
The college degree isn’t dead. But the wrong kind could cost you $2 million
By Jerry BalentineMarch 26, 2026
3 hours ago
trump
CommentaryMarkets
We’re no longer in a bull or bear market. We’re in a Trump market — and here’s how to navigate it
By Jeffrey Sonnenfeld and Steven TianMarch 26, 2026
4 hours ago
EuropeLetter from London
Rishi Sunak is giving advice to CEOs on AI. Here are his golden rules
By Kamal AhmedMarch 25, 2026
22 hours ago
retirement
CommentaryRetirement
Our retirement system gets a C-plus; policymakers have an opportunity to make it A grade
By Chris MahoneyMarch 25, 2026
1 day ago
david-f
CommentaryVenture Capital
Europe has survived 3 energy shocks in 4 years. The only way out is to stop buying power from its enemies
By David FrykmanMarch 25, 2026
1 day ago

Most Popular

Success
Palantir’s billionaire CEO says only two kinds of people will succeed in the AI era: trade workers — ‘or you’re neurodivergent’
By Fortune EditorsMarch 24, 2026
2 days ago
Magazine
The youngest-ever female CEO of a Fortune 500 company is fighting Trump's cuts to keep Medicaid strong
By Fortune EditorsMarch 24, 2026
2 days ago
Commentary
The Treasury just declared the U.S. insolvent. The media missed it
By Fortune EditorsMarch 23, 2026
3 days ago
C-Suite
'I didn’t want anybody shooting me': Five Guys CEO gave away $1.5 million bonus to employees over botched BOGO burger birthday celebration
By Fortune EditorsMarch 25, 2026
19 hours ago
Success
JPMorgan’s Jamie Dimon says remote work breeds ‘rope-a-dope politics’ and stunts young workers’ growth
By Fortune EditorsMarch 25, 2026
23 hours ago
Success
The job market is so bad that ‘reverse recruiters’ are charging $1,500 a month just to help people look for jobs
By Fortune EditorsMarch 25, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.