Top 6 Trends that Impact Your Security Posture

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Top 6 Trends that Impact Your Security Posture-7 Next

Advanced Malware and Incident Response

Malware keeps getting more sophisticated and successful, using multiple techniques of obfuscation and hiding in encryption to mask its nasty intent. The traditional "identify and block" model is simply no longer adequate. What's needed today is a more holistic strategy of monitoring the entire environment, detecting intrusion attempts, and responding to successful attacks quickly and effectively.

If you're a security administrator, chances are you already realize that events are happening at all times, everywhere around you. You need a way to not only spot the truly dangerous ones, but also respond to and mitigate them quickly. This requires visibility into and control over all layers of your security posture, the formulation of a consistent and effective response to incidents and events, and the ability to automate the remediation process. This, in turn, requires the ability to look back in time, see what deviated between then and now, and implement an automated remediation solution. It's also very important to learn from the unsuccessful attacks on your environment as well. Each attack that you detect gives you vital information about your attackers: tools, techniques, and procedures that can help you ensure your defensive layers are adaptive and increase the efficacy of your controls.

Last year, according to the 2016 Cyberthreat Defense Report from CyberEdge Group, a shocking 76 percent of enterprises were victims of a successful cyber attack. Even more shocking is that these attacks are occurring despite increased spending on security. You can interpret this several ways. Companies are either overconfident about their security defenses; they're underestimating the extent of the growing attack surface; or they're unaware of how profoundly recent trends impact their security defenses.

For many companies, it's all of the above. In any case, the place to start in strengthening your security posture is to take a more structured approach to analyzing the security impacts of recent trends and prioritizing your security investments.

Brian Kenyon, chief strategy officer at Blue Coat (now part of Symantec company), has identified six overarching trends that significantly impact the security posture of the enterprise, along with the key requirements and considerations for strengthening security defenses in each category. This slideshow will present the big picture and a discussion of these six trends.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.