Gadget Page
No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming
PRICING
SUBSCRIBE
  • Home
  • Apps
  • Gadget Info
  • Gaming
No Result
View All Result
Gadget Page
No Result
View All Result
Home Uncategorized

The Private Sector Needs a Cybersecurity Transformation – Dark Reading

gadgetpage by gadgetpage
December 15, 2020
Reading Time: 5 mins read
0
The Private Sector Needs a Cybersecurity Transformation – Dark Reading



RELATED POSTS

Puedes descargar Age of Empires III gratis y legalmente

Vanessa Kirby will play Sue Storm in Fantastic Four

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt

Cybersecurity must get to the point where it’s equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away.

Today’s cyber-defense protocols often look something like an unarmed security guard at a parking garage. Someone reports their car stolen or vandalized, and all the guard can do is report that it’s happened. Hopefully, the guard is backed by a security system with cameras, and if there’s a good description of the perpetrator, the guard can keep a lookout. But there isn’t much more the guard can do. He can’t call for support every time someone suspicious looking walks in, nor can he actively engage with each and every car alarm.

This is the reality for so many IT and security teams that are exhausted from responding to threats that have already happened and chasing down the pile of false positives clogging their queue. Most cybersecurity vendors boast about protection, but what they really mean is their appliance or software can detect something and feed a security information and event management system. All that does is put more pressure on IT to set the stage and defend against what’s next, so long as it looks exactly like what came before. In today’s increasingly digital world, that’s just not good enough.

Indeed, this type of operation has, unfortunately, made massive and damaging vulnerabilities the norm. Companies have lost millions as a result, with the average breach costing nearly $4 million in 2019. Those costs also pile up over time as the trust of once-loyal consumers evaporates when troves of personal data are compromised. Yet many businesses simply aren’t aware that the prevailing posture of “detect, respond, recover” is outdated and inefficient.

By next year, more than 12 billion smart devices will keep us connected to friends, family, and work — 3 billion more than a year ago. If businesses want to realize the enormous potential that digital transformation offers, another transformation is also in order: one that will bring about a new standard of defense to match the connectivity and sophistication of cyberattacks that are increasing by the day.

But first, we have to redefine longstanding principles about what cybersecurity is.

Focusing on the Past to Protect the Future
Fundamentally, the current approach to security is focused on the past — even if it’s just a few milliseconds ago. Identifying a threat that already occurred and stopping the next one is not protection. And with the advances in technology available today, it should not be the accepted protocol for our industry.

When a time-consuming analysis results in the conclusion of “we can block this attack next time,” you are nowhere close to secure. Simply put, this approach does nothing to account for the agile adversaries that we know exist.

Staying agile in this fight means looking forward, not back. For that to be a reality however, time plays a crucial role. Research from Ponemon Institute shows that security teams spend at least 25% of their time chasing false positives. I’d argue it’s even higher. Defense cannot continue to be about uncovering the threats that have already happened while trying to block them again. Time has to be spent on truly preventing what’s coming next.

Committing Time to the Wrong Pursuits
Another hallmark of mainstream defense is that the presence of so many false positives consumes the most precious commodity IT teams have: time. In one recent study, more than half of cybersecurity professionals surveyed had left a job — or know someone who had — due to burnout and overwork. The reason so much time is invested in low-yield activities points to the fact that the industry still largely views prevention through a hygiene lens.

While hygiene is important, there is very little prevention going on at the threat level. Well-meaning employees have been stretched so thin that they find post-event response acceptable and equate it to cybersecurity. Sometimes hygiene equates to patching, but often there is a good reason why you can’t patch. That’s not their fault; it’s simply the limitations of the system they’re working with.

As an industry, we must get to the point where cybersecurity is equated with actually stopping an attack by identifying the methods the bad guys use and taking those methods away. Are they hiding in a ZIP file? A nesting of ZIP files? Does the ZIP file contain an RTF? With OLEs and CFBs? Or was it obfuscated JavaScript in the Web session? Can you look inside there and find the shellcode that doesn’t belong? Can you do that in flight — while the Internet session is building? Without slowing the session down? And if you can detect that hidden or heavily obfuscated code, what happens next? Do you just block? Generate an alert? How sure are you?

It is possible to stop attacks with extreme precision before they become a problem — whether it’s through a man-in-the-middle that neutralizes an attack or another tool that enables active defense. This is about more than taking the techniques of your adversaries off the board. This approach will be essential for the future of our industry, so overworked IT teams can stop responding to attacks that have already happened and start experiencing protection at a whole new scale.

Steve Ryan is founder and CEO of Trinity Cyber, a company redefining network threat prevention. Steve left the National Security Agency in 2016 as the Deputy Director of its Threat Operations Center after a distinguished 32-year career as a custom chip designer and … View Full Bio

More Insights





Source link

Share this:

  • Twitter
  • Facebook
ShareTweetPin
gadgetpage

gadgetpage

Related Posts

Puedes descargar Age of Empires III gratis y legalmente
Uncategorized

Puedes descargar Age of Empires III gratis y legalmente

August 4, 2023
Vanessa Kirby will play Sue Storm in Fantastic Four
Uncategorized

Vanessa Kirby will play Sue Storm in Fantastic Four

August 4, 2023
Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt
Uncategorized

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt

August 3, 2023
OLED-Roadmap 2024: Monitorhersteller gibt Einblicke
Uncategorized

OLED-Roadmap 2024: Monitorhersteller gibt Einblicke

August 2, 2023
Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com
Uncategorized

Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com

August 2, 2023
Samsung Galaxy S23 FE: Neue Details zur Kamera
Uncategorized

Samsung Galaxy S23 FE: Neue Details zur Kamera

August 2, 2023
Next Post
Naked Security Live – How to avoid “big brand” email scams

Naked Security Live – How to avoid “big brand” email scams

This new app uses AI to help you save and invest money

This new app uses AI to help you save and invest money

Recommended Stories

A Step-By Step Guide To Registering Your Business In Bangkok And Using Social Media – Social Media Explorer

A Step-By Step Guide To Registering Your Business In Bangkok And Using Social Media – Social Media Explorer

September 16, 2020
EY: Coordinated action vital to meet Gigabit Britain network deployment targets

EY: Coordinated action vital to meet Gigabit Britain network deployment targets

December 17, 2020
Vaxis ATOM 500 SDI Wireless Video System Announced | CineD

Vaxis ATOM 500 SDI Wireless Video System Announced | CineD

October 16, 2020

Popular Stories

  • Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    0 shares
    Share 0 Tweet 0
  • Gamescom 2023: Asus Republic of Gamers event with new products and contests

    0 shares
    Share 0 Tweet 0
  • Horizon Forbidden West, new major event: all accounts

    0 shares
    Share 0 Tweet 0
  • iPhone 12 mini Review | Trusted Reviews

    0 shares
    Share 0 Tweet 0
  • Zoom Am7 Microphone for USB-C Android Phones Announced | CineD

    0 shares
    Share 0 Tweet 0
  • Home
  • Apps
  • Gadget Info
  • Gaming
Call us: +1 234 JEG THEME

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?