From the Blogosphere
Effective SOC and an Automated Process | @ThingsExpo #IoT #M2M #Cybersecurity
There are plenty of very real and costly examples that show why organizations are increasing their spending for cybersecurity
By: Slavik Markovich
Sep. 15, 2017 12:00 PM
Why 2017 Is the Time to Invest in an Effective SOC and an Automated Process
Every Security Operations Center (SOC) manager and security analyst is struggling to some degree to stay one step ahead of the dramatic growth in cybercrime and the ransomware epidemic. In fact, according to the Cybersecurity Market Report published by Cybersecurity Ventures, a cyber security research and publishing firm, spending on cybersecurity is predicted to top $1 trillion between 2017 and 2021.
There are plenty of very real and costly examples that show why organizations are increasing their spending for cybersecurity. While the high profile Mirai attacks with the Dyn IoT botnet attack affecting more than 100,000 endpoints is just the latest, the reality is that this is just the tip of the emerging iceberg.
With a developing reality of billions of under-protected Internet of Things (IoT) devices, the threat landscape can no longer be successfully traversed with outmoded processes. In 2017, organizations are increasingly seeing the benefits of investing in an automation platform within the SOC for effectively fighting cyber threats.
Because it's a very lucrative criminal enterprise, ransomware will only get bigger in 2018. The challenge of handling the nearly limitless generated alerts by network-connected devices alone will strain the SOC human resource element beyond its capacity, which only increases malware vulnerability. What is clear is that attacks in 2017 and 2018 will become more sophisticated and targeted against businesses, governments, educational institutions, and consumers on a global scale.
While IoT and the cloud will continue to be major sources of concern around managing cyber security, open source is exponentially adding to those challenges. Only a few major companies were heavily invested in open source in 2007. In 2017, things have drastically changed, as open Docker, OpenStack, and other open source technologies are the building blocks to the digital infrastructure. Around this time last year, it was reported that 87 percent of open-source vulnerabilities are cross-site scripting (XSS) and SQL Injection. Being free, open to everyone, and customizable to fit any need has enabled an open source community of perhaps millions. However, the benefits of open source also expose its vulnerabilities as cyber criminals can see exploitable flaws in the code as well.
It's challenging enough for security experts to design and implement a cybersecurity playbook, let alone integrating, managing and continuously improving it. Every organization is resource-constrained in this regard, which is why many are automating processes to fight cyber threats in 2017 as part of an effective SOC. Since replacing existing solutions falls far short of meeting the challenges, organizations and their security professionals will be looking to ways to create new automated layers of defense. These automated prevention and response technologies are the ideal solution to providing the tools that can adapt to emerging threats. Simultaneously, they will enable these organizations and their security teams to maximize the capabilities of existing human and technological resources.
Cyber Criminals Wreak Havoc
A Holistic Approach to Win This Situation
This is a growing trend as evidenced by the PwC Global State of Information Security® Survey 2017. The survey shows how "executives are adopting technology and collaborative approaches to cybersecurity and privacy to manage threats and achieve competitive advantages."
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week