Skip to main content

Posts

How to Address the Patching Paradox

Analyze your vulnerability response capabilities.  Assess vulnerability detection and patching capabilities to identify vulnerability response issues. Tackle low-hanging fruit first.  Prioritize minor vulnerability response problems and build a comprehensive vulnerability response strategy over time. Eliminate barriers between security and IT teams.  Combine vulnerability and IT configuration data into a single platform to drive collaboration between security and IT teams. Create end-to-end vulnerability response processes.  Develop vulnerability response processes and ensure that security and IT teams have a shared view of these processes. Retain security talent.  Remove internal barriers, optimize day-to-day processes and automate mundane work; by doing so, an organization can create a positive environment for security teams, increase employee satisfaction and boost the likelihood of retaining top security talent. Manual vulnerability response process...
Recent posts

Let GO! means

What is the  true meaning  of “let go”? To let go is not to cut myself off, it’s the realization that  I can’t control another . To let go is not to enable, but to allow  learning from  natural consequences. To let go is not to admit powerlessness, which means the  outcome is not in my hands . To let go is not to try to change or blame another, it’s to  make the most of myself . To let go is not to care for, but to  care about . To let go is not to fix, but to be  supportive . To let go is not to judge, but to allow another to  be a human being . To let go is not to be in the middle arranging all the outcomes, but to allow others to  affect their own destinies . To let go is not to be protective, it’s to permit another to  face reality . To let go is not to criticize, or regulate anyone, but to try to  become what I dream I can do . To let go is to fear less, and to love more. Remember to l...

Attacker point of view

Real data, real attacks Unlike many of these types of industry reports, our findings are based on actual deployments, in real customers. We don’t scour the headlines to see what attacks were most prevalent, or ask trade show attendees what their biggest concerns  might  be. Need to monitor breach methods in real production environments, then takes the anonymized data and highlights what attacks are best at thwarting or bypassing security, as well as other key trends. Defense-in-depth is dead? It appears most companies maintain a strong focus on perimeter security for network-based attacks, but aren’t doing much to prevent malicious file transfer at the network level. It would appear that file-level scanning is pushed all the way down to endpoints only, negating the defense-in-depth strategy of having multiple layers of protection across the kill chain. Additionally, we saw a high-level of successful attacks which were able to move laterally once inside networks. In f...

Emerging Cybersecurity Solution Requirment

Blockchain for IT security.  Blockchain technology enables data storage in a decentralized and distributed manner, which eliminates a single point of failure and prevents hackers from compromising large volumes of data. Due to its ability to quickly identify the data that has been manipulated, blockchain may become the core technology for highly regulated industries, like banking and law. Continuous Adaptive Risk and Trust Assessment.  Since protection against behind-the-perimeter attacks is not sufficient today, Continuous Risk and Trust Assessment Approach (CARTA), which sees security as a continuous process that changes all the time and has to be regularly reviewed. Real-time assessment of risk and trust will enable organizations to make better decisions regarding their cybersecurity posture and mitigate the risks associated with aberrant user activities. Demand for advanced analytics.  Because security software generates massive amounts of data, organizations need...

Change your game with these 10 types of data

Change your game with these 10 types of data Here is a list of the types of data that can change your game and how each adds value: Sales, demographic and weather data  enables more precise decisions about who to market and sell. With  website, transaction and buying pattern data , you can better understand the demands of your customers and position your products or services more strategically than competitors. With  survey and online review data , you can better understand customers want from what you’re selling. Deciding where to take your business next is virtually impossible without  demographic, regional, weather and income data . Data shows you what’s going on all over the world so you know where to go and places to avoid. Data about consumers  and customers show you how to increase your number of wins and keep customers coming back. Data from operations processes  makes it easier to diagnose weaknesses and errors because no one has to gues...

Remote Management Services: Rethinking the Way You Manage and Operate IT

Remote Management Services: Rethinking the Way You Manage and Operate IT Just a few short years ago, if your car broke down, you would automatically take it to your local mechanic who would identify the issue and fix it. Fast forward to 2013 – today we live in an era where our cars tell   US when there is a potential issue or it needs a service and, more often than not, they just don’t break down at all. We’ve gone from a reactive, break-fix model to a proactive and, sometimes, even a pre-emptive approach, or warranty as they call it. It’s the technology – specifically the software embedded in our cars and the software that supports and maintains it from the manufacturer – that has fundamentally changed this industry. There is a similar shift happening in IT. Customer care-abouts are evolving from simply, “make my technology work” to “make my business better.” Drivers such as   cloud   and   mobility   are causing us to pause and rethink our traditional ...

Security Bloggers Network Social Security Awards 2014 Finalists Announced

This year, award winners will be recognized in multiple categories, including Best Corporate Security Blog, Best Security Blog, Most Educational Security Blog, Most Entertaining Security Blog, Blog that Best Represents the Security Industry, Single Best Blog or Podcast of the Year, The Security Bloggers Hall of Fame and Best New Security Blog. This year's sponsors include Kaspersky Lab,    Sourcefire (now part of Cisco), Akamai, Fortinet, Tripwire, Barracuda Networks, Qualys, RSA Conference and Trainer Communications Nominees this year are Juniper Networks: Security & Mobility Now , Norse , RedSeal Networks , Solutionary: Minds , VioPoint , WhiteHat Security , TripWire: The State of Security , Veracode , Mandiant: M-unition , Fortinet , F-SECURE , Trend Micro TrendLabs Security Intelligence , Kaspersky Lab: Securelist , Akamai , Bit9 , IOActive , SANS: Daily Internet Storm Center Stormc...

FIM QQ

How many systems will need to be monitored with FIM? Which type of architecture will need to be deployed? Which Operating Systems will require monitoring? Does your environment leverage central configuration management? How will FIM alerts be evaluated? Does FIM logs to be sent to a centralized log repository? Who will monitor and approve changes for FIM?  What reports should be developed and who should receive these?  Is FIM required to meet regulatory or standards requirements? How will FIM be tuned and who will be responsible for identifying new FIM signatures? Will a SIEM solution be utilized within the environment? Do you have any PCI DSS requirements? Do you process, store, or forward credit card information? Do you have a compliance need to test and verify the security of your systems? How do you know if the security measures in place are working? Can you verify that you will know if file or object-level changes occur accurately...

Tips and Guidelines for Sizing Your Information Security Organization

There is no magic formula for CIOs and security leaders when assessing the right size of a security team. Factors that influence the team size team include the work it must do, the distribution of responsibility, the extent of the risks the team manages and available resources. ·            Analysis o     Understand the Challenges Inherent in Sizing a Security Function o     Define the Primary Roles of the Security Team o     Consider What Other Organizations Are Doing o     Assess Your Staffing Levels Against the Comparative Ratios §   It Is Important to Remember the Limitations of Using Comparative Data

Digital Business Forever Changes How Risk and Security Deliver Value

Mobile, social, cloud and big data, each a disruptive force, together change everything related to protecting systems and information. CROs, CISOs and other risk and security professionals must use the power of risk management and security to deliver value, and to influence business decision making. Table of Contents ·          Introduction ·          Analysis o     Reset Your Approach to Risk and Security , Balancing the Need to Protect the Organization and the Need to Run the Business o     Assess and Prioritize Risks to Support Conscious Choices About What Will — and Will Not — Be Done to Address Threats §   Scenario Planning for Threats o     Understand and Communicate the Impact IT Risk Has on Business Outcomes o     Accept the Limitations of Technology to Protect the Organization o     Stop Being a Rule ...