{"id":1269,"date":"2016-07-07T00:00:00","date_gmt":"2016-07-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/07\/07\/incident-response-newsalert-2016-07-07\/"},"modified":"2021-12-30T11:39:04","modified_gmt":"2021-12-30T11:39:04","slug":"incident-response-newsalert-2016-07-07","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/07\/07\/incident-response-newsalert-2016-07-07\/","title":{"rendered":"Incident Response Newsalert &#8211; 2016-07-07"},"content":{"rendered":"<p>Table of Contents<\/p>\n<p>    Breach Secure Now!\u2019s New Breach Prevention Platform Provides MSPs with Tools to Minimize the Chance of Client Data Breaches<br \/>\n    Data Breach Digest: Breach trends that will define incident response<br \/>\n    Risk analytics market to experience serious growth<br \/>\n    Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets Sick<br \/>\n    Corax Selects Splice Machine&#8217;s Dual-Engine RDBMS to Deliver Faster, Real-Time Cyber Security Analytics to its Customers<br \/>\n    Increased Complexity of Attacks to Create Opportunities for the Global Security Intelligence and Analytics Solutions Market Through 2020, Reports Technavio<\/p>\n<p>Breach Secure Now!\u2019s New Breach Prevention Platform Provides MSPs with Tools to Minimize the Chance of Client Data Breaches<br \/>\nBreach Secure Now! has released its highly anticipated Breach Prevention Platform, a suite of security tools to help MSPs reduce the likelihood of their clients having a data breach.<br \/>\nMSPs can add these breach prevention tools to their portfolio of IT services, and offer them to clients under their own label.<br \/>\nBreach Prevention Platform sits behind the MSP\u2019s branded security portal and lets clients access a variety of tools, from automated security risk assessments (SRA) and simulated phishing attacks to security policies and ongoing employee security training.<br \/>\nA new addition to the Breach Prevention Platform is the variety of employee security training tools, since the majority of breaches happen due to human error.<br \/>\nThe security training starts with an overview of security threats, such as phishing scams, ransomware, social media hoaxes, hackable wifi, etc., and the information is bolstered with ongoing lessons aimed at reinforcing the initial material.<br \/>\nAs an option, MSPs can add $100,000 of financial protection and breach response services to the Breach Prevention Platform.<br \/>\nThese value-added services can provide the critical help their clients will need to survive and recover if a breach does occur.<br \/>\nThe breach response services supplement the services MSPs already provide to their clients.<br \/>\nUnlike the MSP\u2019s typical security offerings of firewalls, anti-virus and security patches that are invisible to clients, Breach Prevention Platform is customer-facing and interactive.<br \/>\nLink: http:\/\/www.pressreleaserocket.net\/breach-secure-nows-new-breach-prevention-platform-provides-msps-with-tools-to-minimize-the-chance-of-client-data-breaches\/467332\/<\/p>\n<p>Data Breach Digest: Breach trends that will define incident response<br \/>\nAlong with being a great way to make sense of the major security news we see every day, a key part of effective breach response is being able to anticipate the emerging threats and effectively integrate them into the incident response process.<br \/>\nThe following reviews a few of our 2015 predictions to see how they fared and some fresh threats for businesses to consider:<br \/>\nEMV Chip and PIN Liability Shift Will Not Stop Payment Breaches<br \/>\nThe Healthcare Industry Will Face New Attacks and Stay in the Crosshairs<br \/>\nCyber Conflicts Between Countries Will Leave Consumers and Businesses as Collateral Damage<br \/>\nThe first half of 2016 has also presented several threats that companies must be on the lookout to address:<br \/>\nPhishing for Data (Not Malware)<br \/>\nUsername and Password Hacks Are Back in Style<br \/>\nCorporate Extortion<br \/>\nLink: http:\/\/www.securityinfowatch.com\/article\/12228883\/data-breach-digest-breach-trends-that-will-define-incident-response<\/p>\n<p>Risk analytics market to experience serious growth<br \/>\nThe risk analytics market is estimated to grow from USD 16.55 billion in 2016 to USD 30.18 billion by 2021, at a Compound Annual Growth Rate (CAGR) of 12.8%, according to MarketsandMarkets.<br \/>\nThe major vendors in the Risk Analytics Market include IBM, SAP, SAS Institute, Oracle, FIS Global, and Verisk Analytics, along with others.<br \/>\nThe GRC software is expected to dominate the market from 2016 to 2021.<br \/>\nThis is due to the fact that this software empowers organizations with the ability to identify, manage, monitor, and analyze risk and compliance across the enterprise in a single integrated solution.<br \/>\nScorecard and visualization tools software is expected to gain traction in the next five years as it enables representation of multi-dimensional data to enhance the quality of analysis and insight by facilitating rapid and accurate observations.<br \/>\nThe manufacturing segment is expected to grow at a rapid rate from 2016 to 2021 in the Risk Analytics Market.<br \/>\nThe high growth rate can be attributed to the rapidly changing customer expectations, fierce market competition, and stringent regulatory constraints faced by the manufacturing industries.<br \/>\nNorth America is expected to have the largest market share and dominate the Risk Analytics Market from 2016 to 2021, due to increasing adoption of risk analytics software and services by organizations in order to safeguard their businesses from losses and also because of the stern non-compliance measures adopted by the government and various regulatory bodies in this region.<br \/>\nAPAC offers potential growth opportunities due to the rise in technology penetration and presence of large number of SMEs which are under tremendous competitive pressure from large enterprises.<br \/>\nLink: https:\/\/www.helpnetsecurity.com\/2016\/07\/06\/risk-analytics-market\/<\/p>\n<p>Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets Sick<br \/>\nCongratulations, you\u2019re the new CISO.<br \/>\nWhether you have served in the role previously or it\u2019s new to you, you\u2019ll be asked to observe your new organization, to develop a 100-day plan, to evaluate people, processes, and technology, and of course you\u2019ll need to tell the CEO where you would attack the organization and how you will protect against that.<br \/>\nIt\u2019s a daunting and exciting task to be the new CISO.<br \/>\nYour SOC became sick for several reasons.<\/p>\n<p>The technology you have is antiquated and completely signature-based, best suited for static threats, not advanced threats.<br \/>\nWhile signature-based solutions have a role, it\u2019s a secondary protection role.<br \/>\nThe organization failed to keep up with technology and the evolving threat.<br \/>\nFor years, the organization has relied on incremental funding.<br \/>\nThis budget strategy has a typical result; a disparate mix of capabilities purchased individually as security silos without consideration for how the capabilities will work together.<br \/>\nThe tools don\u2019t work together.<br \/>\nIt\u2019s an integration nightmare!<br \/>\nYour goal now is to bring it back to a healthy state.<br \/>\nHere are five strategies to overcome SOC-atrophy.<br \/>\n&#8211; Research to understand all SOC investments.<br \/>\n&#8211; Perform a SOC-focused assessment.<br \/>\n&#8211; Study the threat landscape.<br \/>\n&#8211; Resist the urge to fund your tools piecemeal.<br \/>\n&#8211; Encourage cross-organizational collaboration.<br \/>\nLink: http:\/\/www.darkreading.com\/threat-intelligence\/diagnosis-soc-atrophy-what-to-do-when-your-security-operation-center-gets-sick\/a\/d-id\/1326118<\/p>\n<p>Corax Selects Splice Machine&#8217;s Dual-Engine RDBMS to Deliver Faster, Real-Time Cyber Security Analytics to its Customers<br \/>\nSAN FRANCISCO, July 6, 2016 \/PRNewswire\/ &#8212; Splice Machine, the dual-engine RDBMS for mixed operational and analytical workloads, powered by Hadoop and Spark, today announced that Corax, a startup company that provides cloud-based cyber security operations, analysis and reporting software, has selected Splice Machine to manage its risk quantification calculations, store large datasets and meet future scalability requirements.<br \/>\nLeveraging machine learning and a streamlined user interface, Corax will be able to provide faster, meaningful recommendations to its customers about cyber security actions, investment and insurance, helping them make decisions that prevent cyber crime and data loss.<br \/>\nSplice Machine is a dual-engine RDBMS for mixed operational and analytical workloads, powered by Hadoop and Spark.<br \/>\nInstead of having to synchronize data across multiple compute engines like a traditional Lambda architecture, Corax is able to rely on a less complex architecture with a dual-engine RDBMS, enabling its analytical systems to propagate threat data in real-time, while simultaneously performing compute-heavy analytics jobs \u2013 all from one data source.<br \/>\nLink: http:\/\/finance.yahoo.com\/news\/corax-selects-splice-machines-dual-120000362.html<\/p>\n<p>Increased Complexity of Attacks to Create Opportunities for the Global Security Intelligence and Analytics Solutions Market Through 2020, Reports Technavio<br \/>\nLONDON&#8211;(BUSINESS WIRE)&#8211;Technavio analysts forecast the global security intelligence and analytics solutions market to grow at a CAGR of over 10% during the forecast period, according to their latest report.<br \/>\nThe research study covers the present scenario and growth prospects of the global security intelligence and analytics solutions market for 2016-2020.<br \/>\nThe report also lists security intelligence and security analytics as the two main product segments, with security intelligence accounting for more than 71% of the market share.<br \/>\nMost internet service providers have a distributed architecture hence, a security solution at the network level cannot limit the threat of attacks.<br \/>\nMost attacks on systems originate from the web.<br \/>\nFor consumers, most threats are sourced from web interactions and peer-to-peer usage.<br \/>\nAs these threats target specific systems, they are difficult to detect and prevent at the network level.<br \/>\nTherefore, end-users are increasingly adopting security intelligence and analytics solutions at a rapid pace, as these solutions help in detecting and eliminating the threats.<br \/>\nAccording to Amrita Choudhury, a lead analyst at Technavio for IT security research, \u201cSecurity breaches pose the threat of loss of end-user data and will lead potential customers away from the company as well as erode the brand image and equity of the company.<br \/>\nThus, investments in threat intelligence security have considerably increased due to increased need for enterprises to preserve their reputation and brand image.\u201d<br \/>\nThe complexity of threats directed toward end-users is increasing.<br \/>\nFor instance, threats such as advanced persistent threats are on the rise.<br \/>\nUnlike the traditional threats that were individual in nature and were targeted at a single system, these threats are targeted at a whole setup.<br \/>\nFurthermore, they have the capability to bring down the infrastructure of a whole entity.<br \/>\nHence, to counter these attacks, which are increasing in both frequency and complexity, end-users are adopting security analytics solutions at a rapid pace.<br \/>\nGrowing use of mobile devices such as laptops, smartphones, and other handheld devices is contributing to the growth of the market.<br \/>\nThe increased use of mobile devices leads to the storage of critical information and easy access to this information.<br \/>\nThis increases the need to protect these devices.<br \/>\nLink: http:\/\/www.businesswire.com\/news\/home\/20160705005292\/en\/Increased-Complexity-Attacks-Create-Opportunities-Global-Security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Table of Contents Breach Secure Now!\u2019s New Breach Prevention Platform Provides MSPs with Tools to Minimize the Chance of Client Data Breaches Data Breach Digest: Breach trends that will define incident response Risk analytics market to experience serious growth Diagnosis SOC-atrophy: What To Do When Your Security Operation Center Gets&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29,31,30],"tags":[],"class_list":["post-1269","post","type-post","status-publish","format-standard","hentry","category-news","category-ott-video","category-pending-review"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1269"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1269\/revisions"}],"predecessor-version":[{"id":3756,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1269\/revisions\/3756"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}