Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • A Cure for a Disheartened Cybersecurity Professional
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware

A Cure for a Disheartened Cybersecurity Professional

5 years ago Mitch Parker
A Cure for a Disheartened Cybersecurity Professional

Data breaches and ransomware attacks aren’t just still occurring. They’re also becoming more frequent. According to ZDNet, the number of ransomware attacks detected and blocked by one security firm grew 715% year-over-year in 2020 alone. Another security company calculated the total number of ransomware attacks for the year to be around 65,000, wrote NPR. That’s about seven ransomware incidents every hour.

As a security professional with more than two decades of experience in the industry, these findings are very concerning. To add to my dismay, the public responses by the captains at the helm of most victimized organizations are less than reassuring. I can understand that some comments must be calculated to protect an organization’s public image as well as to deflect various peripheral liabilities. However, it leads me to wonder if there is some greater fault at work here.  Specifically, are the “best practices” not working, or worse, are they being ignored?  Is there a solution on the horizon for either scenario?

Welcome to the Cost-Avoidance Center

I am optimistic that the problem is not one of ignorance or failed security implementations.  Rather, it may just be one of getting security leaders to adopt a more diligent focus when it comes to addressing the problem. Many organizations must carefully choose where to apply their resources towards maximizing profits.

That reality reflects just how much cyberattacks have changed over the past few decades. Years and years ago, a company could place cybersecurity at the lower end of where to spend budget. Cyberattacks were rare back then, and they were cause for little more than embarrassment.  Now, cyberattacks are costly and very damaging. They can sometimes even gain the attention of world leaders. Clearly, cybersecurity is no longer merely a “cost center” for many businesses; it is a cost-avoidance center.

Start with Detection

When allocating their spend, it’s important for organizations to remember that there are solutions that do not need to break the bank. One of these is Tripwire Enterprise. It provides all the necessary rules to monitor critical OS files, binaries, directories, and registry keys.

Not only that, but Tripwire Enterprise also includes thousands of security policies that teams can easily set up and configure to marry to their company’s needs.

Tripwire can apply MITRE ATT&CK as one of these policies, for instance. For those of you who don’t know, MITRE ATT&CK® is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK framework is widely used as a foundation for developing specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

Why It’s Important for Tripwire Clients to Utilize This Framework

If we just look at initial access tactics found in the MITRE ATT&CK framework, we are giving the firm an opportunity to address specific tools and tactics in real time to stop these attacks from taking hold in their systems and on their networks.

Through having a thoughtful well executed cyber program, utilizing Tripwire as a detection mechanism can give the company a level of visibility to not only monitor the integrity of files but also to apply specific measures against attack attempts and to provide clarity not otherwise noted. This is possible because Tripwire covers all aspects of IT and security. These elements include the following:

  • Security – Tripwire provides the most foundational controls in industry standard frameworks like NIST, ISO, MITRE, and CIS, and it provides more coverage with automated workflows and integrations.
  • Compliance – Tripwire comes with the most extensive policy library in the industry. With over 800 combinations of platforms and regulatory standards, it helps organizations to maintain compliance over time with monitoring, audit evidence, and reports that reduce audit workload.
  • IT Ops – Tripwire can help you to maintain your infrastructure and configurations to the state you need. It does this by managing changes to control unauthorized changes that cause downtime OR unplanned work.

These elements come together to reduce Mean Time To Repair (MTTR), something which every organization is after.

Finish With Flare
The most interesting thing to note here is that Tripwire Enterprise is just a detection mechanism. As such, for an organization that is reluctant to allow automated changes in the event of a security incident, this is an excellent tool to enhance any security operation.

A carefully crafted investment in the development of a well-formulated security program that has detective-based controls will not prevent a targeted attack, however. Early detection is the key to reduced impact. From a “return on investment” perspective, the cost to implement is far below the cost of a full-scale security event.

Let Tripwire be a partner in helping you to reach your cybersecurity goals.

The post ” A Cure for a Disheartened Cybersecurity Professional” appeared first on TripWire

Source:TripWire – Mitch Parker

Tags: Compliance, Critical Severity, Finance, Malware, Ransomware, TripWire

Continue Reading

Previous NPM Package Steals Passwords via Chrome’s Account-Recovery Tool
Next Another Hacker Arrested for 2020 Twitter Hack and Massive Bitcoin Scam

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

11 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

14 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT