The focus is shifting and expanding, with respect to cyberthreat awareness and analysis. The more threat data you have to funnel into today’s filtering technologies, the better, because that provides more meaningful correlations of events that can help to find the needles in the massive threat event haystack. But event correlation is only a subset of what has to happen to improve our odds in dealing with threats, especially advanced persistent threats (APTs). Correlation, also referred to as data distilling, puts pieces together -- x alert plus y alert in z order plus # occurrences, etc. With well-defined data fields and rules it is very effective, but it has to know exactly what to look for.
The expanded view needs to be broader and situational. It needs to incorporate conceptual awareness. It’s not a great example, but here goes... When arriving home from work recently (very late, of course), through the window I could see smoke in the kitchen. Instead of panic and a 911 call, I smiled. My brain instantaneously put all the data points together -- smoke, company coming over that night, bag of apples on the table that morning, plus prior history. My wife’s famous apple pie had bubbled over in the oven (again). When put into context, I knew it was a very good thing.
Areas of contextual awareness related to cyberthreats could include intelligence on:
Who might target you and their plans
What’s normal and not in your environment
Your implementation of new systems, Websites, domains, applications
Other breaches in your industry, community
Big-data technologies are going to play a huge role in going beyond (but not totally replacing) the human involvement that is the contextual factor. Linkages will be made by data mining and applying advanced analytics to the mountains of unstructured data. To beat the attackers, you need to think like one and find their anomalous patterns. If you think only like a victim, expect to be in clean-up mode (like my wife with her apple pie).
Gigi, I also tend to side with you concerning the unauthorized downloads. It is evident they seem to rank first where cyber insecurity is concerned. Most of them are scams and fake links which upon downloading to your software, corrupts everything leading acquisition of computer viruses. I think it's high time we be very cautious when it comes to downloading of documents from the varied sites.
@Gigi absolutely. The pace with which technology is advancing required a frequent revisits to your already in vogue procedures may be which ever department they are related to. The stagnant approach means the end of the line. The change in tech also necessitates the change in security protocols which must comply with the security aspect at that particular time definitely.
-Many smaller enterprises believe they are safe from the claws. They have a common idea that we are a low profile company so we are not in someone's cross hair. This is what causes them to be lax and leads to disaster.
@lufu: I think the security measures taken are the best around or they are the best that could have got in certain resources. We will always find something which is one level higher than what we have right now. Which means another level of better security and that would not be possible if the lower level was 100% secure. I think what you have done is good in terms of covering all possible angles (which is really difficult). Now you will start climbing the ladder of security levels which I don't think will ever end.
The blogs and comments posted on EnterpriseEfficiency.com do not reflect the views of TechWeb, EnterpriseEfficiency.com, or its sponsors. EnterpriseEfficiency.com, TechWeb, and its sponsors do not assume responsibility for any comments, claims, or opinions made by authors and bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
3/12/2014 - How will the end of Windows XP support impact your organization? While a timely OS migration eases immediate IT concerns, it may have the added benefit of helping to drive larger business goals. Learn from an expert ways to achieve greater automation and reduce licensing costs while increasing manageability and security.
Enterprise Efficiency is looking for engaged readers to moderate the message boards on this site. Engage in high-IQ conversations with IT industry leaders; earn kudos and perks. Interested? E-mail: email@example.com
Dell's Efficiency Modeling Tool The major problem facing the CIO is how to measure the effectiveness of the IT department. Learn how Dell’s Efficiency Modeling Tool gives the CIO two clear, powerful numbers: Efficiency Quotient and Impact Quotient. These numbers can be transforma¬tive not only to the department, but to the entire enterprise. Read the full report
Now that TGen has broken new ground in genomic research by using Dell's storage, cloud, and high-performance computing solutions, the company discusses what will come next for it and for personalized medicine.
The Translational Genomics Research Institute wanted to save lives, but its efforts were hobbled by immense computing challenges related to collecting, processing, sharing, and storing enormous amounts of data.
We really don't want an "Internet of Everything" but even building an Internet of Everythinguseful means setting some ground rules to insure there's value in the process and that costs and risks are minimized.
Google's Chrome OS has a lot of potential value and a lot of recent press, but it still needs something to make it more than a thin client. It needs cloud integration, it needs extended APIs via web services, and it needs to suck it up and support a hard drive.
On a recent African trip I saw examples of the value of the cloud in developing nations, for educational and community development programs. We could build on this, but not only in developing economies, because these same programs are often under-supported even in first-world countries.
VMware's debate with Cisco on SDN might finally create a fusion between an SDN view that's all about software and another that's all about network equipment. That would be good for every enterprise considering the cloud and SDN.
Wearing a bulky, oversized watch is good training for the next phase in wristwatches: the Internet-enabled, connected watch. Why the smartphone-tethered connected watch makes sense, plus Ivan demos an entirely new concept for the "smart watch."
Cloud storage costs are determined primarily by the rate at which files are changed and the possibility of concurrent access/update. If you can structure your storage use to optimize these factors you can cut costs, perhaps to zero.
The Internet has evolved into a machine for drumming up a chorus of "Happy Birthday" messages, from family, friends, friends of friends who you added on Facebook, random people that you circled on G+, and increasingly, automated bots. Enough already.
Fedora Linux is launching a new model for structuring Linux distributions, a two-ring approach with core functions surrounded by special-interest-group customizations. This could streamline Linux to enhance its role in everything in our tech future.