Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Thursday, 30 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Why To Think Like an Attacker, You Need to See Like an Attacker

by The Gurus
December 19, 2016
in This Week's Gurus
Hacker sinister threat
Share on FacebookShare on Twitter

Social media, mobile computing, cloud services and the Internet of Things (IoT) have changed the way we do business. Adversaries have changed too and are no longer merely watching networks and endpoints to determine how they will attack. Instead, they have a lot of information that they can use to their advantage and are capitalising on the fact that as we take advantage of new technologies we leave behind a digital footprint – an electronic trail of activities.
Not all digital footprints are bad – indeed a good online reputation is hugely positive. However there is a subset of a digital footprint referred to as a digital shadow which can reveal exposed personal, technical or organisational information that is often highly confidential, sensitive or proprietary. This is what adversaries are looking out for and many actively survey the digital shadows that organisations unknowingly cast and use this information to their advantage – seeing vulnerabilities and launching attacks.
To truly understand which threat actors pose a viable threat to your assets and business operations, as a security professional you need to a better understanding of your organisation’s attack surface and own set of unique threats. You need an attacker’s eye view.
While organisations have relied on cyber threat intelligence (CTI) to gain a better understanding of threats and threat actors, we need to do more. Data feeds, vulnerability feeds, indicators of compromise (IOCs) and profiles of threats and research reports will continue to be pertinent. But what’s lacking is cyber situational awareness that provides a more holistic and specific view of threats and vulnerabilities relevant to your organisation. With this view, you can think like an attacker and more effectively address potential threats, instances of sensitive data loss or compromised brand integrity.
So how do you move your security practices in this direction? This three-staged approach can help. And at each stage you’ll see real benefits.
Stage 1: Perception – Building on the internal information and CTI feeds you already gather to understand threats, the focus of this first stage is to understand how you are perceived by hostile threats. By knowing where key information assets, employee credentials and sensitive documents are being exposed online, you can understand where it is likely to be most vulnerable. Information is gathered by examining millions of social sites, cloud-based file sharing sites and other points of compromise across a multi-lingual, global environment spanning the visible, dark and deep web. Cyber situational awareness also analyses and provides information on which malicious actors might be targeting an organisation or industry, why and their methods of attack. The perception stage provides the basis for better cyber situational awareness and in and of itself provides significant new insights that you can immediately act upon to address vulnerabilities or behaviors that violate policies.
Stage 2: Comprehension – With data about yourself and your attackers, the next step is to apply context to understand what information is relevant and meaningful to your specific circumstances. You do this by ensuring that the intelligence directly references your organisation’s brands, assets, concerns and weaknesses, systems and defences (i.e., those things most relevant). Through this lens you can identify which threats pose the greatest risk and use this information to guide security investment decisions and strategies.
Stage 3: Projection – The highest level of cyber situational awareness involves making educated and informed assessments about what might be around the corner to reduce uncertainty and determine what action to take to mitigate the threat. Techniques include analysis of past behavior to predict future behavior, identification of trends, geopolitical analysis and understanding pre-cursors of previous attacks.
In the short-term, complete cyber situational awareness can prevent and mitigate harmful events. By gathering the facts about a breach, you can do damage control and close gaps, such as resetting passwords and generating takedown requests from social media and code-sharing sites.  In the longer-term it can be used to help prioritise threat protection investments and policies. For example, an organisation that has been deferring an investment in data loss prevention (DLP) technologies, armed with the understanding of a particular problem with data leaks, can re-prioritise.
Cyber situational awareness doesn’t happen overnight, but with the right approach you can see what an attacker sees, think like an attacker thinks, and better protect against cyber-related incidents today and in the future.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

SVG Ransomware: It’s About Much More than Facebook

Next Post

Trouble ahead for smart cities, predicts Tripwire’s Rekha Shenoy

Recent News

cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023
Outside of cinema with advertising

Back and Bigger Than Ever! The Inside Man Season 5 Takes a Stab at Power Hungry Adversaries

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information