New Cyber Security Countermeasures Desperately Needed | Weigh In

« Back to Previous Page
31
0
http://blog.vidder.com/blog/new-cyber-attacks-require-new-counter-measures

Please to read the entire article.

Marked as spam
Posted by Gregory Ness (Discussions: 1, Comments: 1)
Replied on May 17, 2017 12:00 am
Category: IT Security
8 views
0
Private comment
I haven't had anybody tell me in a long time that they feel more secure than they did 5 years ago. Yet security spending is up more than 2x. There is a serious problem here. New approaches seem needed even more than desperately.
Marked as spam
Posted by Mark Hoover (Discussions: 0, Comments: 1)
Replied on May 17, 2017 8:00 pm
0
Private comment
I don't believe there is anything new needed, however enterprises need to actually invest in a holistic security program, and not just upgrade the perimeter defenses ever other year. Most enterprises do not want to take on a full scale security program, because it is too much effort. Until CEO's and other non IT C-level starts asking if their networks are segmented with advanced controls between segments, and if there are automated incident response built in, nothing will change.
Marked as spam
Posted by Fredrik Lindstrom (Discussions: 0, Comments: 1)
Replied on May 17, 2017 8:00 pm
0
Private comment
Frederik Lindstrom: I think plenty of CISOs would beg to differ that nothing new is needed. There is a substantial skills shortage fueled by growing network complexity... then there is digitalization and IoT exposing more servers to more attack surfaces... and the cloud. That holistic investment today might require 8 different categories of devices and then more devices to block the holes between them (north vs south; east vs west, etc). Then there is the problem with dispersed hardware and updates... from users with outdated windows to enterprises behind on patching everything including firewalls. This then takes us back to the skills shortage.... and an increasingly ugly storm of complexity in the face of increasingly sophisticated attacks.
Marked as spam
Posted by Gregory Ness (Discussions: 1, Comments: 1)
Replied on May 17, 2017 8:00 pm
0
Private comment
Unlike previous major technological waves (flash storage, virtualization), a massive amount of money has been invested, a massive amount of products developed, and a massive amount of money spent on them - with no material change in result (the size and scope of breaches). That situation is really amazing when you stop and think about it. To anyone truly serious about getting to a zero breach posture, they need to not follow the crowd - the crowd is a false sense of security (pardon the pun).
Marked as spam
Posted by Brett Welborn (Discussions: 0, Comments: 1)
Replied on May 17, 2017 8:00 pm
0
Private comment
The vulnerabilities associated with software/computing are ever present. Regardless of the countermeasures employed the bad guys always seem to find a way. The cyber crime game is very lucrative so we cannot expect and changes to their behaviours. There will have to be some fundamental changes in how coding is developed and deployed.
Marked as spam
Posted by Rohan Joseph - CISSP, CISM (Discussions: 0, Comments: 1)
Replied on May 18, 2017 8:00 pm
« Back to Previous Page