Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

4 must-have security solutions

Posted on September 22, 2004December 30, 2021 by admini

An emerging class of security compliance gateways can scan networks to ensure that any new machines being hooked onto the network comply with an organization?s security policies and are configured properly, said Alan Paller, research director at the SANS Institute, a security training and education organization.

The four essential items are:
1. Vulnerability Management
2. Automated Patch Management
3. Enterprise firewalls and intrusion prevention
4. Token Based Identity Management

http://www.fcw.com/fcw/articles/2004/0920/tec-4sec-09-20-04.asp

Read more

The Best Practices of Highly Secure Organizations

Posted on September 21, 2004December 30, 2021 by admini

But the battle to protect critical data is far from won. The largest security research project ever done—the “2004 Global Information Security Survey,” with 8,100 respondents from 62 countries on six continents.

In the 2003 survey, they noted that the infosecurity discipline had grown but had not really improved. This year, they found that the security function didn’t really grow but did, in fact, improve—at least incrementally.

Despite flat levels of spending, few new human resources being devoted to infosecurity, and the fact that the number of breaches was slightly up from last year, those breaches caused less downtime and cost less when they did occur. They believe this means that incidents are being better managed.

More companies (although still far from a majority) have created an executive-level security presence, and more have included risk management, audit and other non-IT elements in their security governance.

Last year’s barriers to good security—budgets and time—were still cited this year as the most common obstacles, although fewer companies said those issues prevented them from getting the job done. That’s progress, and that’s the good news.

Information security professionals in large part did not execute this year what they said last year were their top strategic priorities.

Negative factors (such as fear of litigation) remain the primary drivers of security spending. Positive factors (such as contributing to business objectives) were less common.

The attitude among security professionals toward critical infrastructure, regulation and working with the authorities after incidents can best be described as laissez-faire, maybe even lackadaisical.

As fond as the IT industry is of declaring revolutions, the information security part of IT resists such drama.

This year’s data reinforces the view that security remains a discipline, adapting itself over time to a harsh environment of threats and vulnerabilities.

They defined a small group—about one-fifth of respondents—that described itself as “very confident” in the effectiveness of its information security practices. This group has earned the right to be confident. Collectively, while those respondents reported more security incidents, they experienced less downtime and fewer financial losses than the average respondent. This is just one of the reasons they are the Best Practices Group.

In last year’s data, we uncovered what we called “The Confidence Correlation”—in which enterprises that expressed confidence in their security were, in fact, more secure. This year, the trend was even more pronounced.

The Best Practices Group may have suffered more incidents than the average respondent, but those incidents didn’t precipitate more damage or downtime. Indeed, the Best Practices Group suffered less of each despite being targeted more often. That higher number of reported incidents can be attributed to two facts.

First, these tended to be larger companies, and larger companies are targeted more by the bad guys.

Second, the Best Practices Group generally had a more comprehensive security infrastructure, which gave it more visibility into what was happening on its networks.

They know the Best Practices Group had better security, because the survey asked respondents what security and privacy safeguards their companies had in place.

And for every single one of the 84 safeguards listed, the Best Practices Group was more likely—sometimes by a wide margin—than the average respondent to have put it in place.

The organizations with high confidence in their security created a virtuous cycle.

They do a better job securing their infrastructure, which breeds confidence in the enterprise (especially in the executive ranks), and that confidence translates into support that manifests itself in resources. Greater resources means the Best Practices Group can improve security, which breeds more confidence.

It’s good to be confident. It’s better to have good reason to be confident. Here’s a to-do list that we believe will help you work your way into the Best Practices Group. These disciplines can either exist under a single CSO or as separate entities governed by an executive security committee.

1. Invest: U.S. respondents said infosecurity accounts for less than 9 percent of their IT budgets. The Best Practices Group claimed 14 percent.
2. Separate information security from IT and then merge it with physical security.
3. Conduct a penetration test to patch up network and application security. (The Best Practices Group was 60 percent more likely to do this than the average respondent.) Perform a complete security audit to identify threats to employees and intellectual property. (The Best Practices Group did this far more often than the average respondent.) Create a comprehensive risk assessment process to classify and prioritize threats and vulnerabilities. (The Best Practices Group was 50 percent more likely to do this.) Define your overall security architecture and plan from the previous three steps. (Two-thirds of the Best Practices Group did this as opposed to only half of the respondents overall.)
4. Establish a quarterly review process, with metrics (for example, employee compliance rates) to measure your security’s effectiveness. This will help you to use your increased resources more efficiently.

Yet, damages to the enterprise were down.

And the time between the announcement of a vulnerability and the attack that exploited it was shrinking from several months to, in the case of Sasser, 18 days.

That’s why it’s so surprising and heartening to report that while the bad stuff keeps coming, one-third of respondents who were hit by security breaches reported zero downtime, and one-third also reported zero financial damages. Overall, both downtime and damages were lower this year than last.

This year’s data indicates that information security executives are learning to treat their colds and remembering that an ounce of prevention is worth a pound of cure.

Fifty-four percent of our respondents designed or improved their existing disaster recovery and business continuity plans in 2004.

Out of 30 security priorities (the top 17 are listed in “Missing the Mark,” right) named in operations and technology in 2003, execution fell short of ambition in 28 instances.

More disturbing is the fact that the only two priorities from the 2003 survey that were implemented to a greater degree than planned involved firewalls. The most commonly cited barrier was, as always, money. Ikbal sees a series of factors contributing to the priority gap: “These tasks are unpleasant, and people will put them off if they can.

Last year, only 15 percent of respondents said they’d created a CSO or CISO position; that leaped to 31 percent this year.

For those who theorize that regulation and government involvement will improve information security, these numbers should prove unnerving. Regulation has yet to drive companies toward better security or have much impact on their practices. Only half of all U.S. respondents claimed to be in compliance with HIPAA, and 41 percent reported that they comply with Sarbanes-Oxley. Of course, not every respondent needs to comply with HIPAA. But if we look at those industries that do—health care, pharmaceutical, and biotech at 71 percent, 45 percent and 40 percent compliance, respectively—the story doesn’t change that much.

Security professionals are dubious of both current and potential future regulation. “No regulation is preferable to bad regulation,” says the CISO of a major electronics company. On the other hand, if we don’t regulate, we’re heading to a bad event with critical infrastructure, and then you’ll end up with regulation passed in reaction to the bad event. Tt would be the worst of both worlds.”

That bad event is what DHS’s color-coding seeks to avoid. The government’s threat-level reporting is widely believed to be for the public but, in fact, it was meant to alert first responders in the private sector to guide them in their protection of the critical infrastructure. When DHS Secretary Tom Ridge introduced the system in 2002, he said, “We anticipate and hope that businesses and hospitals and schools…will develop their own protective measures for each threat condition.”

Only one in 10 respondents reacts to homeland security alerts, and again, the breakdown by industry serves to reinforce that point. No other industry reached 10 percent answering yes. And eight industries, including agriculture and electronics, had zero respondents who changed their practices according to the threat level.

“What can we do with a nonspecific threat?” “If it were, say, an orange alert for the supply chain, then we could take specific actions. Otherwise, we can’t be moving resources around without knowing why we’re doing it.”

Regulations don’t create security; people create security. At the same time, regulation has a purpose. Even Scott Charney, CSO of Microsoft, believes that well-crafted regulations (he used to write them when he worked for the Justice Department) can have a positive effect on information security.

Right now, the DHS’scolor-coded alert system does not identify the specific threats that the infrastructure faces. “The key is they have to be written well, and that’s not easy to do,” Charney says. “Passing a regulation that says ‘Thou shalt be safe’ isn’t useful.” Right now, the color-coded alert system does not identify the specific threats that the infrastructure faces, nor does it guide the actions of information security professionals.

Until DHS and industry leaders, in a combined effort, can define what’s supposed to happen when the light goes from yellow to orange, the threat-level warning system can only produce agitation, not information.

“The Game’s Afoot” The data from the “2004 Global Information Security Survey” shows movement in the right direction. Happily, you’ve evolved, and information security practices are slowly improving. Unhappily, the threat environment is also evolving.

Just as you’ve started to gain ground in the virus battles, spam, malicious code and confidence tricks are being designed to far more destructive ends (including extortion and theft) than simple network downtime. Phishing was so limited last year that we didn’t even ask about it. This year, 13 percent of respondents said they were affected by it.

Yes, you’re managing the viruses and other security nuisances better. But, the information infrastructure is no longer the target; it’s just the path used to get to far more profitable targets.

Perhaps this is why the “not at all confident” group of respondents ticked up from 10 percent last year to 14 percent this year.

Yes, information security improved in 2004, but this is no time to celebrate. Ever more sophisticated Dr. Moriarities are out there, lurking. For them, and for you, the game’s afoot.

http://www.csoonline.com/read/090104/survey.html

Read more

VeriSign bundles authentication tools

Posted on September 21, 2004December 30, 2021 by admini

The package of security software and services, which incorporates elements of the company’s VeriSign Intelligence products and ControlSM Services, provides a centralized system for supporting various forms of network authentication, including passwords, smart cards and USB tokens, according to the Mountain View, Calif.-based maker of network security software.

By letting customers integrate multiple network-identification techniques, VeriSign says the product, dubbed VeriSign Unified Authentication, can save companies significant time and effort, while providing more secure IT systems protection.

The tools is set to become available Sept. 30.

VeriSign, which also serves as an Internet domain registry, said the package will let customers use existing security technology built into so-called directory services products, such as Microsoft Active Directory, Radius servers, and single-sign on infrastructure, including identity management software made by IBM’s Tivoli unit.

The company will offer the option for buyers to manage their own authentication operations or outsource those responsibilities to VeriSign using a hosted version of service. Executives at the company said the system will cost roughly $25 per user each year.

In addition to introducing the authentication package, VeriSign announced that it will release a Windows-specific version of the system later this year.

The company acknowledges that it would prefer customers to buy its entire Unified Authentication package, but it has created a version designed to integrate its security tools with elements of Microsoft’s Windows Server 2003 operating system. VeriSign said the package was created through a relationship it has established with Microsoft.

Known primarily for its role as one of the Internet’s primary sources of domain registry services, VeriSign has been pushing hard to build its network security business. Earlier this year, the company announced that it had won a multiyear agreement to provide security services for financial giant U.S. Bancorp; it has a similar deal in place with Merrill Lynch.

http://news.com.com/VeriSign+launches+authentication+tools/2100-7347_3-5375225.html?part=rss&tag=5375225&subj=news.7347.5

Read more

Ford in Major Shift to VoIP

Posted on September 21, 2004December 30, 2021 by admini

SBC Communications (Quote, Chart) will design, install and manage the project using IP phones and network equipment from Cisco Systems.

The Ford VoIP deployment will occur over three years and impact the headquarters and other facilities in southeast Michigan.

Profits aside, the Ford contract could serve as a case study for SBC and Cisco to present to other large corporations that may have misgivings about VoIP.

Ford is expected to save money over its Centrex (define) phone system in several areas, including the decrease in its long-distance bills. The company also expects system maintenance to decline by shifting voice and data onto a single IP network. Also, IP telephony service makes handling employee moves more efficient, because businesses can scale up or down without calling vendors or ordering new cards.

http://www.internetnews.com/infra/article.php/3410681

Read more

Cisco Named One Of Top Three Most Trusted Security Vendors

Posted on September 21, 2004December 30, 2021 by admini

Cisco has been ranked as one of the top three most trusted security product vendors and one of the top three most trusted security service providers in two surveys done by the Yankee Group.

The Yankee Group 2004 Managed Security Services Survey found that of 606 enterprises, Symantec, Cisco and VeriSign rank as the three most trusted security service vendors. In another survey, the Yankee Group 2004 Enterprise Security Services survey, Cisco, Cisco, Symantec, and Network Associates ranked as the three most trusted vendors of security products.

Waterfield also noted that firewalls and antivirus tools are the security products most valued by enterprises.

http://www.networkingpipeline.com/showArticle.jhtml?articleID=47900555

Read more

Gartner: Information security is still key

Posted on September 20, 2004December 30, 2021 by admini

Gartner says the next five years will see new waves of technology rendering existing information security measures obsolete, increasing security exposures in both new and legacy environments.

Wheatman notes how, in recent years, key technologies have forced a constantly changing security environment. “In the same way that PCs broke the host-centric security model, networked PCs eroded the gains that had been won in securing individual desktops. Then we saw how distributed applications running across LANs reset security maturity to zero, while the inclusion of external networks as a part of the topology reset client/server security.”

In addition to the constant cycles of technology change that has kept ICT security managers working overtime in recent years, Gartner points to the cyber threats that will ensure information security threats remain constant over the next few years.”

To enable security managers to evaluate the risks facing their enterprises, Gartner has developed a cyberthreat hype cycle, mapping out the threats that must be taken into consideration.

Gartner says that for those who thought that the information security risks they have battled with in recent years were all but over, this may well be unwelcome news.

In conclusion, Wheatman states: “Perfect security is impossible, but continual scanning for new vulnerabilities and monitoring for new threats is critical and a much better investment than to passively sit back and wait to detect attacks.

http://www.ictworld.co.za/EditorialEdit.asp?EditorialID=20006

Read more

Posts navigation

  • Previous
  • 1
  • …
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • …
  • 421
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme