Skip to main content

Posts

Showing posts from 2018

How to Address the Patching Paradox

Analyze your vulnerability response capabilities.  Assess vulnerability detection and patching capabilities to identify vulnerability response issues. Tackle low-hanging fruit first.  Prioritize minor vulnerability response problems and build a comprehensive vulnerability response strategy over time. Eliminate barriers between security and IT teams.  Combine vulnerability and IT configuration data into a single platform to drive collaboration between security and IT teams. Create end-to-end vulnerability response processes.  Develop vulnerability response processes and ensure that security and IT teams have a shared view of these processes. Retain security talent.  Remove internal barriers, optimize day-to-day processes and automate mundane work; by doing so, an organization can create a positive environment for security teams, increase employee satisfaction and boost the likelihood of retaining top security talent. Manual vulnerability response process...

Let GO! means

What is the  true meaning  of “let go”? To let go is not to cut myself off, it’s the realization that  I can’t control another . To let go is not to enable, but to allow  learning from  natural consequences. To let go is not to admit powerlessness, which means the  outcome is not in my hands . To let go is not to try to change or blame another, it’s to  make the most of myself . To let go is not to care for, but to  care about . To let go is not to fix, but to be  supportive . To let go is not to judge, but to allow another to  be a human being . To let go is not to be in the middle arranging all the outcomes, but to allow others to  affect their own destinies . To let go is not to be protective, it’s to permit another to  face reality . To let go is not to criticize, or regulate anyone, but to try to  become what I dream I can do . To let go is to fear less, and to love more. Remember to l...

Attacker point of view

Real data, real attacks Unlike many of these types of industry reports, our findings are based on actual deployments, in real customers. We don’t scour the headlines to see what attacks were most prevalent, or ask trade show attendees what their biggest concerns  might  be. Need to monitor breach methods in real production environments, then takes the anonymized data and highlights what attacks are best at thwarting or bypassing security, as well as other key trends. Defense-in-depth is dead? It appears most companies maintain a strong focus on perimeter security for network-based attacks, but aren’t doing much to prevent malicious file transfer at the network level. It would appear that file-level scanning is pushed all the way down to endpoints only, negating the defense-in-depth strategy of having multiple layers of protection across the kill chain. Additionally, we saw a high-level of successful attacks which were able to move laterally once inside networks. In f...

Emerging Cybersecurity Solution Requirment

Blockchain for IT security.  Blockchain technology enables data storage in a decentralized and distributed manner, which eliminates a single point of failure and prevents hackers from compromising large volumes of data. Due to its ability to quickly identify the data that has been manipulated, blockchain may become the core technology for highly regulated industries, like banking and law. Continuous Adaptive Risk and Trust Assessment.  Since protection against behind-the-perimeter attacks is not sufficient today, Continuous Risk and Trust Assessment Approach (CARTA), which sees security as a continuous process that changes all the time and has to be regularly reviewed. Real-time assessment of risk and trust will enable organizations to make better decisions regarding their cybersecurity posture and mitigate the risks associated with aberrant user activities. Demand for advanced analytics.  Because security software generates massive amounts of data, organizations need...