Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

The Four Cybersecurity Terms Businesses Need to Know

by The Gurus
September 13, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

Technological evolution yields a constantly changing threat landscape. Those who learn survive, and those who don’t evolve and grow their knowledge, are left behind. Just a couple of weeks ago at Black Hat, we heard a number of different conversations on the four key areas below, cementing their role as the cybersecurity hot topics of the near future.
Behavior Baselining
Time and time again we see undetected attackers lurking in organisations’ networks for months – even years. Just this past October, it came to light that cyber attackers linked to the Chinese government breached Samsung Pay provider LoopPay for months without detection. Stories like these are a reminder that our best means for minimising a breach’s impact is to differentiate between normal and abnormal activities.
The core concept of behavioral baselining is to understand the normal behavior such that you can identify deviations from the norm. Most organisations accomplish this by employing people and technologies utilising data science and machine learning for automated analysis. They combine this with and fast access to forensic data to quickly spot abnormal activity patterns and detect breaches before they take down an organisation.
Active Response
As organisations get better at detecting threats, the number of alerts their systems create also increases. This causes what security operations center (SOC) managers call alert fatigue. Too many alerts, but not enough time to respond to them. Imagine knowing about all the wildfires in an area but not having a mechanism to prioritise and address the fire with limited resources. Due to the inability to respond, breaches persist for long periods of time. Just this summer the Democratic National Committee grabbed headlines when it was revealed that Russian hackers were inside its servers for over a year.
Active response is the ability to respond to an attack as soon as it is detected within the organisation’s environment. The response could include communication with secondary systems such as a ticketing system, or it could include creating a ticket or collecting additional data. It also could be a configuration change such as modifying a firewall to block communication with a bad actor. Active response can be fully automated or it can be human-mediated. The goal of active response is to enable an organisation to make the best use of its people, process and technology through automation.
Security Analytics
Identifying trends and patterns in an organisation is a good starting point to mitigate systemic problems as well as identifying threats. Security analytics are the result of data analysis across multiple sources of data, often log data enriched with non-log data such as threat intel. The purpose of security analytics is to provide actionable knowledge to the security analysts and to security managers.
Attackers regularly target outdated or unpatched systems. Many industrial control systems (ICS) and infrastructure systems have been recently targeted due to their ineffective and outdated defenses. An example of security analytics in this case could be to identify the number of systems that are vulnerable and accessible from the internet. This analytic enables the actioning of vulnerability management efforts.
Other examples include analysing data to spot an attack based on previously known patterns, peer-group based analytics to spot outliers within connections and activities of “like” individuals. There is a clear need for security and IT teams to use analytics to broaden their security and operations insights.
Public Key Cryptography
For many of us, the word cryptography reminds of James Bond films with incredibly smart yet evil mathematicians feverishly working to break the code to a nuclear warhead. But today, we use public key cryptography hundreds or thousands of times per day—whether it is purchasing a product online, digitally signing a document or to logging in to a device or website via a multi-factor authentication system. In an oppressive country, public key cryptography may be the only way for citizens and dissidents to exchange messages without risking their safety at the hands of governments. In many circles, cryptography has become a controversial topic.
The HeartBleed bug in openssl and the various backdoors discovered in network security devices have caused concerns of trust for a number of manufacturers. Like these technologies, cryptography is embedded in many software and hardware systems that form the core of our financial systems and healthcare systems. In some cases, cryptography has been leveraged by attackers, most notably inransomware attacks against healthcare providers during which attackers encrypt critical data and demand a ransom in return. But just like cryptographic bugs in commercial hardware and software, even malware has had crypto bugs.
It is important for all security practitioners to understand the implications of cryptography to their business. Understand where the most critical applications are, how they make use of cryptography, who manages the cryptographic keys in your business, and how you will manage the next big crypto related vulnerability in your environment.
The Bottom Line
Security risks are heightened when organisations lack the ability to speak the same language as security professionals. And because of its rapidly shifting nature, cybersecurity is a moving target. It’s unreasonable to expect everyone in your organisation and external parties, like partners and customers, to be experts, but making the risks easier to understand can go a long way toward improving security hygiene.

FacebookTweetLinkedIn
ShareTweet
Previous Post

e92plus target DDoS and Threat Intelligence opportunities through partnership with NSFOCUS

Next Post

Beware the Drive-by Attack

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information