The focus is shifting and expanding, with respect to cyberthreat awareness and analysis. The more threat data you have to funnel into today’s filtering technologies, the better, because that provides more meaningful correlations of events that can help to find the needles in the massive threat event haystack. But event correlation is only a subset of what has to happen to improve our odds in dealing with threats, especially advanced persistent threats (APTs). Correlation, also referred to as data distilling, puts pieces together -- x alert plus y alert in z order plus # occurrences, etc. With well-defined data fields and rules it is very effective, but it has to know exactly what to look for.
The expanded view needs to be broader and situational. It needs to incorporate conceptual awareness. It’s not a great example, but here goes... When arriving home from work recently (very late, of course), through the window I could see smoke in the kitchen. Instead of panic and a 911 call, I smiled. My brain instantaneously put all the data points together -- smoke, company coming over that night, bag of apples on the table that morning, plus prior history. My wife’s famous apple pie had bubbled over in the oven (again). When put into context, I knew it was a very good thing.
Areas of contextual awareness related to cyberthreats could include intelligence on:
Who might target you and their plans
What’s normal and not in your environment
Your implementation of new systems, Websites, domains, applications
Other breaches in your industry, community
Big-data technologies are going to play a huge role in going beyond (but not totally replacing) the human involvement that is the contextual factor. Linkages will be made by data mining and applying advanced analytics to the mountains of unstructured data. To beat the attackers, you need to think like one and find their anomalous patterns. If you think only like a victim, expect to be in clean-up mode (like my wife with her apple pie).
Gigi, I also tend to side with you concerning the unauthorized downloads. It is evident they seem to rank first where cyber insecurity is concerned. Most of them are scams and fake links which upon downloading to your software, corrupts everything leading acquisition of computer viruses. I think it's high time we be very cautious when it comes to downloading of documents from the varied sites.
@Gigi absolutely. The pace with which technology is advancing required a frequent revisits to your already in vogue procedures may be which ever department they are related to. The stagnant approach means the end of the line. The change in tech also necessitates the change in security protocols which must comply with the security aspect at that particular time definitely.
-Many smaller enterprises believe they are safe from the claws. They have a common idea that we are a low profile company so we are not in someone's cross hair. This is what causes them to be lax and leads to disaster.
@lufu: I think the security measures taken are the best around or they are the best that could have got in certain resources. We will always find something which is one level higher than what we have right now. Which means another level of better security and that would not be possible if the lower level was 100% secure. I think what you have done is good in terms of covering all possible angles (which is really difficult). Now you will start climbing the ladder of security levels which I don't think will ever end.
The blogs and comments posted on EnterpriseEfficiency.com do not reflect the views of TechWeb, EnterpriseEfficiency.com, or its sponsors. EnterpriseEfficiency.com, TechWeb, and its sponsors do not assume responsibility for any comments, claims, or opinions made by authors and bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
12/17/2013 - This webcast will show how you can:
-Transform your IT infrastructure by leveraging Dell’s OpenManage integrated with System Center, our Hyper-Scale technologies, and factory capabilities
-Connect with people-centric solutions with Dell Desktop Virtualization Solutions (DVS)
-Inform your users with business intelligence based on Dell deployment, applications like Boomi, and comprehensive reference architectures
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail: firstname.lastname@example.org
Dell's Efficiency Modeling Tool The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise. Read the full report
Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
On a recent African trip I saw examples of the value of the cloud in developing nations, for educational and community development programs. We could build on this, but not only in developing economies, because these same programs are often under-supported even in first-world countries.
VMware's debate with Cisco on SDN might finally create a fusion between an SDN view that's all about software and another that's all about network equipment. That would be good for every enterprise considering the cloud and SDN.
Wearing a bulky, oversized watch is good training for the next phase in wristwatches: the Internet-enabled, connected watch. Why the smartphone-tethered connected watch makes sense, plus Ivan demos an entirely new concept for the "smart watch."
Cloud storage costs are determined primarily by the rate at which files are changed and the possibility of concurrent access/update. If you can structure your storage use to optimize these factors you can cut costs, perhaps to zero.
The Internet has evolved into a machine for drumming up a chorus of "Happy Birthday" messages, from family, friends, friends of friends who you added on Facebook, random people that you circled on G+, and increasingly, automated bots. Enough already.
Fedora Linux is launching a new model for structuring Linux distributions, a two-ring approach with core functions surrounded by special-interest-group customizations. This could streamline Linux to enhance its role in everything in our tech future.
For many users, lack of support is the only barrier to open-source adoption, and there are some strategies that can be used to get you support and one possible way of minimizing your need for it in the first place.
Who'd have thought? But the liaison is actually not only good for both companies, it's good for the cloud market, because it will promote the cloud to SMBs, and it's the little guys that will make or break the cloud of the future.