Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

What Price Security?

Posted on April 24, 2005December 30, 2021 by admini

This article looks at new ways that businesses are making the ROI case for this critical investment.

It’s a conundrum that plagues businesses large and small as they strive to wring competitive advantage from every dollar they spend: Where is the quantifiable proof that X amount of spending will prevent Y amount of losses due to security breaches?

Traditional cost-benefit analysis hasn’t been much help here because costs and benefits need to be measured in the same terms. That’s easy with some straightforward revenue-enhancing investments, but not with security.

For many companies, the benefit of their security investment often boils down to so-called “soft” returns — such as the protection of their brand image by avoiding the negative publicity associated with being hacked.

Perhaps it’s not surprising that, in the absence of hard numbers, advocates for increased security spending sometimes find themselves falling back on fear, uncertainty and doubt — or FUD — to make their case.

In the past few years a body of research has grown that supports the — theory that it is possible to calculate a tangible return on security investment (or ROSI). Much of this research comes from the fields of risk assessment and risk management

It looks at such things as cost reduction related to risk mitigation and productivity gains associated with security investment.

Cost-benefit trade-offs Researchers at the University of Idaho assessed the cost-benefit trade-offs for a network intrusion detection system (IDS) they built. Their goal was to prove that it’s more cost-effective to deal with attacks using intrusion detection than through other means.

Their conclusion: An IDS that cost $40,000 and was 85 percent effective resulted in a ROSI of $45,000 on a network that was expected to lose $100,000 yearly as a result of intrusions.

Baseline comparisons In a third study, researchers erected a network infrastructure similar to that used by companies conducting transactions over the Internet. Performance metrics were taken to establish a baseline throughput rate. Security measures were then applied in steps, and new metrics were taken and compared with the baseline metrics.

Researchers found that applying appropriate security measures can create efficiency gains — that is, increased network throughput — of more than 3 percent.

As the above examples show, calculating a tangible ROSI is math- and labor-intensive.

Research is now available to help calculate the cost of security incidents to an organization company and the probability that a given incident will occur.

At the same time, the threat of cyber attacks continues to grow each day, including the emergence of two overarching threats to corporate computer security: the spread of fast-spreading, “blended” threats (i.e., malicious code), and insufficient funding allocated by managers for security initiatives.

http://www.itstrategycenter.com/itworld/Res/analytics/what_price_sec/index.html

Read more

The Defining Moment

Posted on April 22, 2005December 30, 2021 by admini

Those aren’t convergence; they are merely dumb ideas. And like a lot of dumb ideas—rooted in an insufficient respect for reality—they provoke objections that miss the point, such as: “IT security is too complicated and important to entrust to those ‘guns and holsters’ guys.” Or “How can a technogeek possibly manage an executive protection strategy?” (For a list of five common convergence objections just begging to be overruled, go to www.csoonline.com/printlinks.)

It may be more revealing to think in terms of integrated or holistic security management. In fact, while physical and information security are the cornerstones of holistic security, they aren’t the whole ball of wax. Depending on which industry they serve, CSOs need visibility into fraud and loss-prevention efforts, investigations, process-control systems, business continuity, pieces of regulatory compliance, some aspects of the human resources function and audit.

But reworking the organizational chart isn’t really the end goal, according to Timothy Williams; it’s just one possible means of establishing the necessary accountability and processes that make security effective. Williams is the CSO at Nortel Networks, where he has been leading a centralized, multifaceted security program since 1990. “If you don’t trust the person you’re giving the group to, forget it; it will never work. It’s about how we manage risk and the processes between the domains,” he says.

A case of intellectual property theft doesn’t fit neatly into any of the domains of IT, corporate security or legal; it crosses all of these functions. To Williams, convergence is about “what we are doing to make sure we’re not creating or missing an interdependency between the various areas.” In some cases, the CSO (by whatever title he or she goes) has direct oversight of two or three branches of security, plus dotted-line reports to well-placed employees in other branches. Which lines are dotted and which are solid can depend on the circumstances and priorities of each company, and on the expertise of the CSO.

Steve Hunt, a CPP-toting former Forrester Research analyst, goes so far as to say the leadership role is best handled by a committee, an idea he says is gaining traction particularly in Europe. Hunt says he has seen it work, though it’s worth noting that leadership by committee generally has a checkered history in the corporate world.

Having noted that convergence isn’t accomplished by remaking reporting relationships, Williams circles back to reemphasize that convergence is not the same as “having lunch once in a while. Constellation Energy Group CIO Beth Perlman, who handed the reins of information security to ex-Marine John Petruzzi, sums it up: “If you don’t trust the person you’re giving the group to, forget it; it will never work.”

Another key leadership requirement, Williams adds, is the ability to articulate security and risk issues in the context of business activities and in the language of the corporate boardroom.

Today’s corporate security department is an evolution of what used to be referred to as physical security; over time, forward-thinking practitioners demonstrated the value of putting surveillance, fraud investigations, executive protection, and an assortment of other activities (each requiring different knowledge and skills) under a single umbrella.

http://www.csoonline.com/read/041505/intro_moment_3536.html

Read more

Worm Lull, Windows XP SP2 Keeping Outbreaks At Bay

Posted on April 21, 2005December 30, 2021 by admini

“2004 was distinguished by a number of major epidemics caused by e-mail worms such as MyDoom, NetSky, Bagle, and Zafi,” said Alexander Gostev, a senior analyst with Moscow-based Kaspersky Labs, in a report he authored on the security situation for the first quarter of the year. “However, late 2004 and early 2005 were free of such outbreaks, with nothing on the scale of even the mid-sized outbreaks of 2004,” Gostev added.

The decline in destructive power of e-mailed worms may be due to anti-virus vendors developing new technologies to address them, including detecting worms in compressed .zip files and pre-scanning messages with executable attachments, but he also gave credit to Microsoft for patching several Outlook and Outlook Express vulnerabilities.

“The increased media focus on malicious code and security issues has resulted in end users being noticeably more cautious about opening e-mail attachments, especially those from unknown sources,” he noted. “They’ve been effectively displaced by network worms incorporating Trojan components,” he said.

Even though Microsoft has released a record number of patches in the first four months of 2005, “no new vulnerabilities as serious as the LSASS or RPC DCOM vulnerabilities have been detected in Windows so far this year,” said Gostev in his report.

Mass-mailed worms and vulnerabilities may be down, but phishing — as almost everyone knows — is on a rocket ride, and spyware is the security buzzword of the year so far. “Several billion dollars are currently invested in virtual worlds and role-playing games, a sum equivalent to the budget of a small country. Naturally, [that] hasn’t escaped the attention of cyber criminals.

http://www.techweb.com/wire/security/161501182

Read more

Microsoft, VeriSign Team on Wi-Fi Security Architecture

Posted on April 20, 2005December 30, 2021 by admini

The two companies will collaborate to create a Wi-Fi security architecture based on Microsoft’s NAP (Network Access Protection) and VeriSign’s Unified Authentication platforms.

The new architecture will help system administrators crack down on Wi-Fi-enabled computers that do not adhere to corporate security policies and facilitate use of multifactor authentication for accessing Wi-Fi networks, according to a statement.

“Evil Twin” and other wireless spoofing attacks provide a rich set of tools for identity thieves and corporate espionage agents.

Microsoft’s NAP combines client/server technology with a new set of policy validation and enforcement APIs that allow administrators to quarantine client machines if they fail basic “health” tests, such as having up-to-date anti-virus definitions or operating system patches.

VeriSign Unified Authentication is a technology platform for deploying and provisioning multifactor authentication technology such as smart cards, secure USB (Universal Serial Bus) tokens and one-time passwords.

VeriSign said it will work with Microsoft so that networks using VeriSign Unified Authentication can issue health certificates to Windows desktop clients so that they can access NAP-protected networks, the companies said. VeriSign will also integrate its Unified Authentication platform with Microsoft’s Active Directory user directory technology and Internet Authentication Servers.

Better integration will make management of user and device authentication credentials for Windows clients easier on Wi-Fi networks, the companies said.

http://www.eweek.com/article2/0,1759,1788375,00.asp?kc=EWRSS03119TX1K0000594

Read more

Experts urge wireless security integration

Posted on April 20, 2005December 30, 2021 by admini

IT managers should either integrate the new wireless piece into the overall company security policy, if one already exists, or take the opportunity to create a plan for the entire IT infrastructure, security experts urged Wednesday at the event, being held in Cambridge, Massachusetts.

Instead of considering wireless security in isolation, technology managers should think of defending their existing wired network against a new set of threats that emanate from the wireless world, said Craig Mathias, principal at advisory and systems integration company Farpoint Group, based in Ashland, Massachusetts.

It used to be the case that corporations weren’t embracing wireless technology because of security concerns. Now, however, the leading barrier to adoption is the perceived complexity of wireless security, according to Lisa Phifer, vice president of consulting firm Core Competence in Chester Springs, Pennsylvania. The situation is beginning to change, as vendors build more functionality into wireless LAN switches.

Mathias singled out Ann Arbor, Michigan-based Interlink Networks Inc.’s LucidLink, an enterprise-level wireless security application designed to be easily deployed by small business and home office users. Mathias stressed that wireless will likely form only a small piece of a company’s security policy, mostly in terms of specifying which mobile devices and intermediary networks for remote access meet desirable corporate security standards.

“We have a saying (here) that if you could just get rid of the end-users, you could have perfect security,” quipped Jim Burns, senior software developer at Portsmouth, New Hampshire-based network authentication software developer Meetinghouse.

http://www.infoworld.com/article/05/04/21/HNexpertsurge_1.html

Read more

Symantec Offers Free Anti-Spyware Beta

Posted on April 19, 2005December 30, 2021 by admini

Norton Internet Security 2005 Anti-Spyware Edition is, as the name implies, a version of Symantec’s all-in-one consumer and small business security suite. “Customers want an all-in-one solution,” said Kraig Lane, the group product manager for the suite line.

The anti-spyware technology included in Norton Internet Security (NIS) uses Symantec’s already-announced Risk Impact Model, a system the company will use to analyze adware and spyware, score it against a set of predefined criteria, then toss it in a “delete” bin or ask the user what he/she wants to do with it. The new model, which Symantec has said moves away from the black-and-white malicious code approach of detecting and deleting viruses and worms to a more flexible technique that lets users make some decisions about what to keep and what to throw away, is also a way to fend off spyware and adware makers’ threats.

Other advantages of Symantec’s anti-spyware addition to NIS, said Lane, is that it uses the same scanning engine as Norton Anti-Virus, which is also part of the suite’s bundle.

http://www.techweb.com/wire/security/160902145

Read more

Posts pagination

  • Previous
  • 1
  • …
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • …
  • 421
  • Next

Recent Posts

  • AI News – Mon, 17 Nov 2025
  • CSO News – Mon, 17 Nov 2025
  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15

Archives

  • November 2025
  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme