<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>Network Security Blog</title>
	<atom:link href="https://mckeay.net/feed/" rel="self" type="application/rss+xml"/>
	<link>https://mckeay.net/</link>
	<description>The thoughts and ramblings of Martin Mckeay</description>
	<lastBuildDate>Tue, 30 Aug 2022 16:43:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">209325662</site>	<itunes:explicit>no</itunes:explicit><itunes:summary>Join me as I spend 30 minutes each week talking about the computer security issues facing us today. I discuss privacy, hacking, malware and the Payment Card Industry (PCI) Data Security Standards.</itunes:summary><itunes:subtitle>Join me as I spend 30 minutes each week talking about the computer security issues facing us today. I discuss privacy, hacking, malware and the Payment Card Industry (PCI) Data Security Standards.</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:author>Martin McKeay</itunes:author><itunes:owner><itunes:email>netsecpodcast@mckeay.net</itunes:email><itunes:name>Martin McKeay</itunes:name></itunes:owner><item>
		<title>You don’t have to be an expert, but it helps – Team82 State of XIoT 1H22</title>
		<link>https://mckeay.net/you-dont-have-to-be-an-expert-but-it-helps-team82-state-of-xiot-1h22/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=you-dont-have-to-be-an-expert-but-it-helps-team82-state-of-xiot-1h22</link>
		
		
		<pubDate>Tue, 30 Aug 2022 16:43:29 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<category><![CDATA[Claroty]]></category>
		<category><![CDATA[industry report]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=74</guid>

					<description><![CDATA[<p>Only one Too Long; Did Read post this week, The State of XIoT report for 1H 2022 by Claroty&#8217;s Team82. The content and analysis of this report was uneven. There is a lot to commend the team for, but also significant sections that left me shaking my head. This is a reimagining of previous reports, [&#8230;]</p>
<p>The post <a href="https://mckeay.net/you-dont-have-to-be-an-expert-but-it-helps-team82-state-of-xiot-1h22/">You don&#8217;t have to be an expert, but it helps &#8211; Team82 State of XIoT 1H22</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Only one Too Long; Did Read post this week, The State of XIoT report for 1H 2022 by Claroty&#8217;s Team82. The content and analysis of this report was uneven. There is a lot to commend the team for, but also significant sections that left me shaking my head. This is a reimagining of previous reports, so it&#8217;s hopeful that future Claroty reports will build on the better aspects of this one.</p>



<p><strong>Regwall</strong>: Yes, https://claroty.com/resources/reports/state-of-xiot-security-1h-2022</p>



<p><strong>Target Audience</strong>: IoT (or XIoT) experts</p>



<p><strong>Length &amp; Read time</strong>: 35 pages, 30-60 minutes, longer if you are not an IoT expert. I finished reading the report in 75 minutes but required extra time to review some of the terminology and the Purdue Model.</p>



<p><strong>Grade:</strong> B. Despite some parts being hard to digest, this has more going for it than most.</p>



<p><strong>Overall Impression</strong>: I dislike the creation of new initialisms/acronyms in reports, but I think Claroty can get away with it this time. &#8216;XIoT&#8217; stands for the Extended Internet of Things, meaning medical devices, video cameras, embedded devices, and a whole host of other general connected &#8216;things&#8217;. However, the report often uses the initialism for many of these things without clarifying what they mean and how they are used in the report. Lack of definition is a reoccuring theme of the report, from defining terms, to explaining the statistics used, to plots with no titles or captions.</p>



<p>Be prepared to spend some time identifying and understanding the most important parts of this report on your own. Most of the text is a reading of the visualizations, with confusing context and analysis. It may be because IoT/XIoT isn&#8217;t my main area of interest, but I think it&#8217;s because I don&#8217;t like having plots read at me. The writers left too much to the reader to figure out.</p>



<p>Despite the uneven delivery of the report, I still suggest reading it if you&#8217;re interested in IoT in its myriad forms. Several sections contain Key Events and are worth reading on their own. More than anything else, it&#8217;s the Mitigations/Remediations section I would point readers at, starting on page 22. Not only does Team82 give specific suggestions, they provide data to show why specific recommendations should be the reader&#8217;s priority. This section is why think the report is above average, but in need of tender loving care and focus to make it truly shine.</p>



<span id="more-74"></span>



<p><strong>The Good</strong>: Let&#8217;s start with the low hanging fruit. The Team82 report clearly credits the contributions of the researchers, writers, and data scientists who worked on the effort, which is not as common as it should be. The visualizations are generally clear, though there&#8217;s more than a few to cover in the next section of the review. The report sticks with simple visualizations, mainly donut and bar charts. It is a visually pleasing report in most ways. Its layout almost makes some sections into ready to use slides. The colors chosen for the plots make them accessible and are color blind friendly, though the variation of colors in the donut charts are confusing.</p>



<p>As mentioned before, the Mitigation/Remediations section and four Key Events segments are what makes the report above average. We&#8217;re past a time when the security events that could happen are just something we theorize about. From the Russia-Ukraine war to ransomware attacks, we&#8217;re seeing attacks on a daily basis that affect real businesses and real people.</p>



<p>I like the Team82 section of the report; it highlights the group&#8217;s technical knowledge without diving into a marketing spin. A report should show off the author&#8217;s experise, but not blatantly scream &#8216;Buy our product!&#8217;. That said, the section belongs further down in the report. Showing off the data and findings should always come first.</p>



<p>While the report is 35 pages in length, at least 8 pages are separators and the covers, which means it&#8217;s really closer to 25 pages of content. Even at that, it&#8217;s not a short report and there&#8217;s plenty of sections that need extra time to digest. The text isn&#8217;t too dense, but it requires some concentration to read.</p>



<p><strong>The Bad:</strong> The report is very uneven in its delivery of intelligence and how the various sections relate to each other. The data is represented unclearly in many cases, with loosely related data being represented together without an attempt at defining the different threads. In my view, multiple sections are mislabeled and don&#8217;t fit the function they advertise.</p>



<p>The Executive Summary isn&#8217;t a summary at all, it&#8217;s an opening statement that fails at telling the reader what&#8217;s most important in the report. Too much time is spent on the opening arguments, without really telling the reader what they&#8217;ll get out of the report. It does tell us who should read it, but not why. I&#8217;m very keen on telling the reader from the first page what I want them to take from a report and highlighting the primary talking points I want them to know. The Executive Summary is more akin to a first research section than it is a summary.</p>



<p>One of the initialisms from the report, IoMT, is first used in the donut chart on page 5, but the term isn&#8217;t defined until page 15. And I still don&#8217;t know what the author&#8217;s definition of &#8216;IT&#8217; is. Even if this is meant for experts in IoT, any initialism or acronym should be spelled out the first time it&#8217;s used. I might even argue that &#8216;XIoT&#8217; should have been defined on the cover.</p>



<p>The figures aren&#8217;t numbered, with many lacking a title or caption. The donut chart on page 6 lacks both caption and title. While you can tease out which of the talking points to the left it refers to, you shouldn&#8217;t have to. The same page is a good example of missing analysis in many parts of the report. Four different boxes of text are displayed with no clear relationship and a plot lacking context to give it meaning. This is all still in the Executive Summary.</p>



<p>Readers should be clearly shown how the data, the plots, and the analysis are intertwined in a good report. In this case the reader is left to their own devices far too often. Page 26 typifies my concern, with a series of percentages that are dropped onto the page with almost no supporting text.</p>



<p>While the Mitigation/Remediations section was very good, the Recommendations section simply presents the same talking points without the benefit of the data. I think the two sections should have been combined into one, with a single page summary of the report at the end.</p>



<p>Overall, the Team82 report on XIoT is an instrument built of strong materials, but in need of polishing and another generation of design work. It has several very strong sections that may never get read because it loses the reader almost immediately. Kind of like these TL;DR posts.</p>
<p>The post <a href="https://mckeay.net/you-dont-have-to-be-an-expert-but-it-helps-team82-state-of-xiot-1h22/">You don&#8217;t have to be an expert, but it helps &#8211; Team82 State of XIoT 1H22</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">74</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>I wanted to like this report, but … – Fortinet Global Threat Landscape Report 1H 2022</title>
		<link>https://mckeay.net/i-wanted-to-like-this-report-but-fortinet-global-threat-landscape-report-1h-2022/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=i-wanted-to-like-this-report-but-fortinet-global-threat-landscape-report-1h-2022</link>
		
		
		<pubDate>Thu, 25 Aug 2022 18:27:11 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<category><![CDATA[Fortinet]]></category>
		<category><![CDATA[industry report]]></category>
		<category><![CDATA[IPS]]></category>
		<category><![CDATA[TTPs]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=71</guid>

					<description><![CDATA[<p>The Thursday edition of &#8216;Too Long; Did Read&#8217; focuses on Fortinet&#8217;s Global Threat Landscape Report for the first half of 2022. In my experience, 7-8 weeks to go from data collection to a published report is a relatively tight deadline, but it means this data is still timely. I applaud Fortinet for making this report [&#8230;]</p>
<p>The post <a href="https://mckeay.net/i-wanted-to-like-this-report-but-fortinet-global-threat-landscape-report-1h-2022/">I wanted to like this report, but &#8230; &#8211; Fortinet Global Threat Landscape Report 1H 2022</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Thursday edition of &#8216;Too Long; Did Read&#8217; focuses on Fortinet&#8217;s Global Threat Landscape Report for the first half of 2022. In my experience, 7-8 weeks to go from data collection to a published report is a relatively tight deadline, but it means this data is still timely. I applaud Fortinet for making this report available without having to register, which is a rarity. The failure of this report is the use of the term, &#8220;prevalence&#8221;. I suspect most readers have never seen this term used in its data science context and no effort is made to clarify what it means. My suggestion is to read the text, but generally ignore the plots and graphs.</p>



<p>RegWall: No! <a href="https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-report-1h-2022.pdf" target="_blank" rel="noreferrer noopener">https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-report-1h-2022.pdf</a></p>



<p>Target Audience: Technical, primarily for readers in the IPS space.</p>



<p>Length &amp; Read time: 17 pages, 30-45 minutes. Taking notes, I spent 75 minutes with this report, with additional time researching prevalence in statistics.</p>



<p>Grade: C, average for the security industry.</p>



<p>Overall Impression: I was excited to read this report when I first saw it, but found myself becoming more confused as I read through the text and tried to make sense of the data visualizations. The Overview and Key Highlights section sums up the main talking points, but most lack the specificity I&#8217;d like to see.</p>



<p>If you only have a few minutes to devote to the report, read these sections: &#8216;Vulnerabilities in OT&#8217;, pages 7 &amp; 8; &#8216;Ransomware Roundup&#8217;, pages 12-14. I also liked the review of wipers targeting the Ukraine and spilling over into other countries, pages 14-16. But I can&#8217;t recommend the report due to difficult to understand data representation choices.</p>



<span id="more-71"></span>



<p>The Good: As mentioned above, there are a few sections that bouy this report. Figure 5 uses the idea of prevalence in a way that&#8217;s understandable, unlike how it&#8217;s expressed elsewhere in the report. The TTPs table uses color well, highlighting how often different types of techniques are used. I like figure 12, a map of the countries affected by the wipers tied to the Russia-Ukraine war. As a product of the US education system, I&#8217;m aware than many of us have a hard time remembering where European countries are in realationship to each other. I&#8217;ve been to all the countries highlighted and still need to look at the map.</p>



<p>The report has a large number of links leading to other resources. Half lead to other Fortinet reports or posts, half take the reader to organizations like MITRE and FIRST. I&#8217;m generally happy to see readers given an opportunity to learn more. It&#8217;s clear a lot of knowledge and experience has gone into the report.</p>



<p>The Bad: I am not a data scientist and I&#8217;m the first to admit there are significant holes in my education on the topic. But I believe I have significantly more experience with data science than then majority of readers targeted by the Global Threat Landscape Report. Which is why when I started seeing the term &#8216;prevalence&#8217; used with Figure 2 and beyond, I was confused. I&#8217;ve never seen it used in another report in the security industry. I didn&#8217;t know what it meant in context, I didn&#8217;t understand the significance of the percentage, and I still don&#8217;t understand the specifics of how it was in various visualizations.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>In statistics, prevalence is the proportion of individuals in a population who have a specific characteristic at a certain time period.</p><cite>Statology, <a href="https://www.statology.org/prevalence-in-statistics/" target="_blank" rel="noreferrer noopener">https://www.statology.org/prevalence-in-statistics/</a></cite></blockquote>



<p>I understand the standard English definition of &#8216;prevalence&#8217; as &#8216;commonness&#8217;. But used as a percentage measurement for exploits, vulnerabilities, etc. it&#8217;s hard to make sense of. When it&#8217;s used in Figure 5 and shows &#8216;1 in 10K&#8217; on the axis, it makes sense, but every other use of &#8216;prevalence&#8217; is confusing. I like drawing my own conclusions and over half the plots are useless for generating your own analysis. I found reading these visualizations a very frustrating effort.</p>



<p>The paper lacks credits and a methodology section, both of which I expect to see in a report. A few paragraphs spent explaining how the data was collected, how &#8216;prevalence&#8217; was calculated, and what the percentages mean would have made a large part of my complaints moot. Even with an explination, I don&#8217;t think prevalence is the best way to represent the data used, but I&#8217;m open to hearing more.</p>



<p>Rather than having a conclusion, this report titles their closing section as, &#8216;Ending on a High Note&#8217;. A more accurate description would be, &#8216;Ending with a Marketing Call to Action&#8217;. It doesn&#8217;t summarize any of the intelligence in the report, there are no conclusions, it&#8217;s a CTA section, pure and simple. Marketing is a valuable part of any enterprise, but a report is better served highlighting the intelligence and experience of the team. If a reader finds value in your intelligence, they&#8217;ll look at your product without being hit on the head with product pitches.</p>



<p>Please, please, please, honor the work of the authors by crediting them publicly in future reports.</p>
<p>The post <a href="https://mckeay.net/i-wanted-to-like-this-report-but-fortinet-global-threat-landscape-report-1h-2022/">I wanted to like this report, but &#8230; &#8211; Fortinet Global Threat Landscape Report 1H 2022</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">71</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>Hidden Gems Amongst Too Much Text – Unit 42 Cloud Threat Report</title>
		<link>https://mckeay.net/hidden-gems-amongst-too-much-text-unit-42-cloud-threat-report/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=hidden-gems-amongst-too-much-text-unit-42-cloud-threat-report</link>
		
		
		<pubDate>Tue, 23 Aug 2022 18:09:17 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=69</guid>

					<description><![CDATA[<p>My first report for this week&#8217;s &#8216;Too Long; Did Read&#8217; is titled &#8220;Identity Access Management: The First Line of Defense&#8221; by Unit 42 and Prisma Cloud. The report is moderate in length at 19 pages, with significant intelligence scattered throughout. Technical readers who want more information about how cloud identities are being exploited will gain [&#8230;]</p>
<p>The post <a href="https://mckeay.net/hidden-gems-amongst-too-much-text-unit-42-cloud-threat-report/">Hidden Gems Amongst Too Much Text &#8211; Unit 42 Cloud Threat Report</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>My first report for this week&#8217;s &#8216;Too Long; Did Read&#8217; is titled &#8220;Identity Access Management: The First Line of Defense&#8221; by Unit 42 and Prisma Cloud. The report is moderate in length at 19 pages, with significant intelligence scattered throughout. Technical readers who want more information about how cloud identities are being exploited will gain a lot from reading it, though it requires significant concentration to find the gems.</p>



<p><strong>RegWall</strong>: Yes, <a href="https://www.paloaltonetworks.com/prisma/unit42-cloud-threat-research-volume-six" target="_blank" rel="noreferrer noopener">https://www.paloaltonetworks.com/prisma/unit42-cloud-threat-research-volume-six</a></p>



<p><strong>Length/Read time:</strong> 19 pages in length, I suggest setting aside 60-90+ minutes to read in its entirety. I spent 2.5 hours reading the report and taking several pages of notes.</p>



<p><strong>Overall Impression</strong>: Palo Alto Networks&#8217; report is a solid contribution to the security knowledge base, but requires a significant effort to read and understand. The technical details don&#8217;t surface until the sixth page of the report, but come on strong until the conclusion. I enjoyed seeing links to external resources scattered throughout, allowing the reader to follow up on topics of interest. The target reader is a technical audience looking to learn more about Identity and Access Management (IAM), with language accessible to a much larger audience.</p>



<p>Like almost every report, there are things I&#8217;d change with the execution of this report. My primary criticisms are two fold. First, the report has too much text. I don&#8217;t think most readers have the time to sift through thousands of words to find the gems in the report. Second, the report lacks focus, a common criticism of mine. Reading the Foreword, Executive Summary, and Who&#8217;s Attacking the Cloud? sections don&#8217;t tell me what I, the reader, will gain by spending time deep in the report.</p>



<p>Once through the background and introduction of this report, it has a lot to offer. Start on page 6, read through page 16, skip the intro and conclusion. I give this volume of the Cloud Threat Report a grade of B+ overall.</p>



<span id="more-69"></span>



<p><strong>The Good:</strong> I love the fact that this report links to external resources for the reader. There are multiple links to other research by the same team, a plus in my view, but it&#8217;s the link to MITRE, NIST, etc. that add weight to the already good analysis.</p>



<p>There are a pair of diagrams that show the methodology used in attacks, well supported by the text. The remaining visualizations are simple, but useful. I&#8217;ll take a simple plot I can read at a glance over a complex plot I have to examine at length to understand. I also like the &#8216;Key Takeaway&#8217; listed for each of the threat actors later in the report. The tables of TTPs associated with each of the threat actors is a mixed bag, mostly because the tables span more than one page.</p>



<p>This report also contains two things I always look for, a methodology section and credits listing the contributors and researchers by name. The methodolgy section isn&#8217;t expansive, but it shouldn&#8217;t have to be. Explaining the details of where the data comes from tells a reader a lot about how the conclusions were reached. I see too many reports that draw conclusions from very small data sets. Crediting the authors helps them build their own reputation, which is valuble for their careers. It shows support for the individual and a name to reach out to if you disagree with the analysis as a reader. Or am I the only one who does that?</p>



<p><strong>The Bad:</strong> The report is too text heavy and lacks a clear understanding of what it&#8217;s trying to communicate to the reader. As an example, the Foreword is the first thing a reader sees, and it spends nearly half its text talking about a former report. The Executive Summary is not a summary and doesn&#8217;t accurately portray the contents. In the first of the four &#8216;summations&#8217;, I would have written &#8220;<strong>Cloud identities are too permissive &#8211; 99% of the cloud users, roles, services, and resources were granted excessive permissions.</strong>&#8221; Leave that big, bold and simple, leave the exposition to the relevant section of the report.</p>



<p>On a related note, I think the report misses an opportunity by burying an important statistic deep in the report. &#8220;62% of organizations have cloud resources publicly exposed.&#8221; Coupled with the previous point about excessive permissions, this would help create a story a reporter could run with. Maybe getting press coverage isn&#8217;t one of the priorities for the report, but telling a reader a compelling story always should be.</p>



<p>The Conclusion and Recommendations section is weak. Pulling most of a segment from an external resource detracts from the research. In this case, why lean on Gartner language and suggestions when there is more strength on showing your own analysis? I would have dropped the first and last conclusions, linking the &#8216;Focus on Hardening IAM Permissions&#8217;, which is more in line with the majority of the contents.</p>



<p>My criticism are meant to point to how future reports could be made more impactful and more readable. The burden on the reader to wade through the report means a significant portion of readers may never read past the first few pages. Which means they&#8217;ll never get to the juicy stuff in the middle and end of the research. It&#8217;s a good report overall, but lacks focus and clarity on what&#8217;s being communicated to a reader, hence a B+ rating.</p>
<p>The post <a href="https://mckeay.net/hidden-gems-amongst-too-much-text-unit-42-cloud-threat-report/">Hidden Gems Amongst Too Much Text &#8211; Unit 42 Cloud Threat Report</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">69</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>451 Group on API Trends – Spot On, for the Intended Audience</title>
		<link>https://mckeay.net/451-group-on-api-trends-spot-on-for-the-intended-audience/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=451-group-on-api-trends-spot-on-for-the-intended-audience</link>
		
		
		<pubDate>Thu, 18 Aug 2022 18:42:45 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<category><![CDATA[APIs]]></category>
		<category><![CDATA[Survey]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=66</guid>

					<description><![CDATA[<p>Today&#8217;s post for &#8216;Too Long; Did Read&#8217;, is a review of the 2022 API Security Trends Report, written by Dan Kennedy of the 451 Group/S&#38;P for noname Security. Going forward I&#8217;ll add a couple more pieces of information to each post: Is it behind a registration page and how long of a read is it. [&#8230;]</p>
<p>The post <a href="https://mckeay.net/451-group-on-api-trends-spot-on-for-the-intended-audience/">451 Group on API Trends &#8211; Spot On, for the Intended Audience</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Today&#8217;s post for &#8216;Too Long; Did Read&#8217;, is a review of the <a href="https://nonamesecurity.com/api-security-trends-report" target="_blank" rel="noreferrer noopener">2022 API Security Trends Report,</a> written by Dan Kennedy of the 451 Group/S&amp;P for noname Security. Going forward I&#8217;ll add a couple more pieces of information to each post: Is it behind a registration page and how long of a read is it. Alex (@alexanderjaeger) suggested the first, because many of us won&#8217;t fill in the fields needed to get to a report behind a regwall. The second I&#8217;m adding because the amount of time needed to read a report often influences if it&#8217;s read or not. A 10-page report with one or two redeeming qualities can be easier to read than a 100-page report with buckets full of interesting stuff.</p>



<p><strong>Overall Impression</strong> &#8211; For its target audience, this paper is one of the best I&#8217;ve read this year. It has significant analysis scatter throughout, it uses plots appropriately, and the colors are easy to read, for the most part. You have to keep in mind that this is an analyst&#8217;s report, so it&#8217;s based on survey data. I generally think of surveys as &#8216;soft data&#8217; and do not hold this type of information in the same regard as data from logs, alerts, and other data taken directly from sensors. This is definitely a personal bias, but I&#8217;ve seen too many surveys done badly over the years.</p>



<p>The intended reader is anyone considering the future of APIs. This includes organizations creating the next wave of products, both engineers and marketing teams. CSO&#8217;s who want to know their peers experience with current technologies will get a lot out of the API Security Trends Report, as well as teams looking to better understand API protections before making a purchase. It is not for front-line blue/red teams or other security professionals who want deeply technical knowledge. Which is not what we should expect from most analyst reports in the first place. I give this report a solid A.</p>



<p><strong>Reg Wall</strong>: Yes &#8211; <a href="https://nonamesecurity.com/api-security-trends-report" target="_blank" rel="noreferrer noopener">https://nonamesecurity.com/api-security-trends-report</a></p>



<p><strong>Length / Read time</strong>: At 17 pages, this report took me 45 minutes to read and take notes on. A casual read should take 15-30 minutes.  </p>



<span id="more-66"></span>



<p><strong>The Good</strong> &#8211; It may sound like faint praise, but this report knows who its audience is, caters to their needs simply and effectively, and does not get caught up in trying to be something else. But my praise isn&#8217;t faint; I&#8217;d say the majority of the reports in our industry suffer from too many cooks in the kitchen, none of them knowing what the final goal for the report is. In my opinion, being an analyst makes this much easier, because the job centers around knowing your audience and how to reach them.</p>



<p>Each section contains at least one piece of analysis that shows why specific findings are important. This is another issue that sounds like it should be a given, but far too many reports simply read the statistics and don&#8217;t tell you what they mean. None of the analysis is groundbreaking, but that is not the purpose of the report. Here&#8217;s just one example of a statistic being highlighted, and then the author telling us why the statistic matters.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>The ability to inventory critical APIs ranked fourth (51%) in the list of concepts associated with API security, which might seem low in the collection of concerns because it is the first step in securing APIs. After all, one cannot provide security risk mitigation unless there’s an understanding of what’s being secured. However, its ranking may be due to the fact that users consider discovery a commodity or necessary feature of API security tools, and thus table stakes when deciding among API security providers.</p><cite>Dan Kennedy, 2022 ApI Security Trends report</cite></blockquote>



<p>The choices of data visualizations are basic, simple, and exactly what is needed to highlight the data effectively. Bar charts, donut graphs, and horizontal stacked bar charts are the only types of visualizations used in the report. Every donut graph and horizontal stacked bar chart is limited to three data points, allowing them to be read at a glance. While I like seeing more complex visualizations, I&#8217;d rather see reports use the simple plots effectively.</p>



<p>In the first few pages of the report we receive a short list of the key findings, though the placement is deeper in the report than I like to see (page 4). Consider these as well-placed hooks to get you read further into the report in order to find out what they actually mean. The introduction sets the stage for the analysis, but you could easily skip it without decreasing the value you get from the report.</p>



<p>One of the things I greatly appreciate about this report is that every plot is accompanied by the questions asked in the survey and the sample size received. All too often we seen any form of a methodology section missing from reports. In my opinion, the way the questions are phrased to the respondents is almost as important as the responses. At best, badly done surveys miss their mark and skew the results. At worst, bad survey questions make any findings unusable or misleading. Yes, I&#8217;m looking at you, Pikachu and your Pokemon buddies.</p>



<p><strong>The Bad</strong> &#8211; Most of the negatives I found in the report are minor and simply offer room for improvement for the next report. I love that Dan Kennedy is clearly being given credit for the report. But this shouldn&#8217;t be the first thing the reader sees. Credits belong at the end.  Use the premium space at the beginning the report for the Key Findings or the main topics you want the reader to walk away with.</p>



<p>The color choices for the pie charts and stacked charts are questionable. I&#8217;m not sure if the difference between greens is distinct enough to be readable by a color blind audience. But to be fair, the plots are simple and each includes the percentages represented, making the report readable without relying on color as a method of conveying infermation.</p>



<p><strong>Final thoughts</strong> &#8211; I&#8217;ve long thought that the controls most organizations have around APIs were largely non-existent or ineffective. The 2022 API Security Trends Report doesn&#8217;t say much about how widespread protections are, but it does make it clear many organizations are worried about the effectiveness of what they have in place today. I believe this report is worth reading if you are even slightly curious about the perception of API protections today.</p>
<p>The post <a href="https://mckeay.net/451-group-on-api-trends-spot-on-for-the-intended-audience/">451 Group on API Trends &#8211; Spot On, for the Intended Audience</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">66</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>On being critical of industry reports in security</title>
		<link>https://mckeay.net/on-being-critical-of-industry-reports-in-security/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=on-being-critical-of-industry-reports-in-security</link>
		
		
		<pubDate>Tue, 16 Aug 2022 18:23:31 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=63</guid>

					<description><![CDATA[<p>One last thing: A good editor is your best friend when it comes to writing! And like any good friend, they may sometimes tell you your baby is ugly. At least you can throw your first draft in the garbage and start over, unlike a baby.</p>
<p>The post <a href="https://mckeay.net/on-being-critical-of-industry-reports-in-security/">On being critical of industry reports in security</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Rather than writing another review today, this Tuesday&#8217;s essay is an exploration of what I&#8217;m looking for when reviewing a report.</p>



<p>I started the &#8216;Too Long: Did Read&#8217; series of blog post at the suggestion of a friend and former coworker. I have written, edited, and led the charge of over 30 industry reports, the majority with her help. She&#8217;s heard me critique the work of other organizations and be at least as critical of our own works many times over the years. &#8220;Why not use that experience as fuel for blog posts?&#8221;, she asked. </p>



<p>I&#8217;ve been following Verizon&#8217;s Data Breach Investigation Report (DBIR) since the first volume was published. I had the privilege of contributing to the report while working at Verizon and contributed data to the DBIR as part of my role at Akamai. I helped create the first version of Akamai&#8217;s State of the Internet / Security (SOTI) and led the effort through the beginning of 2022. What I&#8217;m getting at is that I&#8217;m not some rando talking smack about reports in the security industry. I have experience to draw from directly related to these reviews.</p>



<p><strong>What am I looking for?</strong></p>



<p>When I read any of the reports, there&#8217;s a laundry list of things I&#8217;m looking for. More than any other factor I&#8217;m looking for a report that understands it&#8217;s audience and gives a compelling reason to read past the introduction. This may sound easy and obvious, but it is probably the single biggest issue most reports in our industry fail to do. I&#8217;ve failed to provide this in many of my own early efforts. The reader is being asked to spend one of their most precious commodities, time, so they need know from the start it will be time well spent.</p>



<p>Whether we&#8217;re talking about sales or writing a book, this is called the &#8216;hook&#8217;. No big surprise there, any good marketing team or PR will ask the author for this hook. It gives them a better idea of how to use the content, what press outlets or reporters to approach, and makes their own work more effective. In my experience, the hook should be the very first thing the reader sees! More important than the index, an introduction to the author, or any other part of the report, I want to see something that tells me why I should turn to page 2! A good understanding of what the author is trying to educate the reader about is also going to be one of the biggest things that will get a reader to open the PDF of your report in the first place.</p>



<p>I learned to ask myself one question after the writing was done, as the report went to design: What three things do I want my readers to walk away with if they quit reading after the first page of the report? These can be part of the introduction, as a standalone section next to the intro, or in some other form ON THE FIRST PAGE.  There might be two bullet points or five, the count isn&#8217;t important. After you&#8217;ve written ten, twenty, or more pages, it&#8217;s easy to lose the core of your message in the fog of relief from getting the first draft completed.</p>



<p><strong>What&#8217;s inside?</strong></p>



<p>Once I know what the purpose of report is, how well it communicates this purpose is next on the block. If I have read the first half dozen pages and still haven&#8217;t been able to divine its purpose, it&#8217;s a major failure. In the land of report writing, there&#8217;s no room for subtlety. Tell me what you&#8217;re going to tell me, tell it to me, then summarize it again at the end. Don&#8217;t hide your intelligence, make it as clear and straight forward as possible.</p>



<p>As I read through the pages, I need to know that the contents in the tin deliver on what the label advertised! If you&#8217;re selling your report as a technical treatise on DDoS attacks, I want to see in-depth information about attacks as quickly as possible. Sticking with a set format that starts the DDoS section on page 20 of a 50-page report is a recipe for failure. Not that I&#8217;ve ever done exactly that, of course. Even worse is when a report is really about a different topic than promised in the title, with only a nod to the title and introduction buried deep in the report.</p>



<p><strong>How does it look?</strong></p>



<p>Next, I look at the data visualizations: the plots, the charts, the diagrams used to reinforce the analysis in the report. Data visualization is a whole field on its own, and I can only brush against the surface of what there is to learn. I want to see a chart that directly relate to the analysis on the page. I want charts that are readable by the widest audience possible. I want charts that tell stories beyond what&#8217;s in the analysis.</p>



<p>I absolutely hate plots that are simply window dressing and have nothing to do with the content and analysis! Space is at a premium, time is valuable, so why waste both with something that offers nothing to the reader? If the author isn&#8217;t presenting analysis or providing additional meaning from an image in the report, why is it there? Having created a beautiful visualization isn&#8217;t a good enough reason to include the image if it doesn&#8217;t further the story.  Personally, I want graphics to have descriptions and figure numbers as much as possible. I like to include additional analysis in the description, but that might not work for all authors.</p>



<p>I&#8217;m a huge advocate for using a Color Blind Friendly (CBF) palette. I have family, friends, and former co-workers who have various degrees and type of color blindness, and the thought of producing a report that doesn&#8217;t take that into account is anathema to me. Approximately 5% of the population is color blind, and more people suffer from color deficiency, a very similar problem. Color is also an incredibly valuable method of conveying information, so be sure to make the most of it. <a href="https://davidmathlogic.com/colorblind/#%23D81B60-%231E88E5-%23FFC107-%23004D40" target="_blank" rel="noreferrer noopener">Coloring for Colorblindness by David Nichols</a> is a good starting point for more information on making accessible plots.</p>



<p>Similarly, unless your audience is other data scientists, I prefer simple plots wherever possible. River plots, dot plots, violin charts, matrix plots and all the other complex graphics are appealing to other data viz geeks, but indecipherable to the average reader.  Most readers will skip a plot they have to struggle with rather than learn something from it. I once spent a page and a half of a 30-page report explaining how to read a river plot many years ago and learned this lesson the hard way.</p>



<p>Stick to bar charts, line plots, and other visualizations most readers can understand at a glance.  I&#8217;ll even include pie charts in this suggestion, but only if the data has four or fewer data points that are highly dissimilar. This means you can&#8217;t use a pie chart to show data with 20 different points, each less than 5% of the total. A table might not be pretty but is much more accessible and educational for a reader.</p>



<p>It&#8217;s okay to use more complex plots, but only with forethought and a clear understanding of the point you&#8217;re trying to make. I strongly recommend reading &#8216;The Truthful Art&#8217; by Alberto Cairo or &#8216;Storytelling with Data&#8217; by Cole Nussbaumer Knaflic as good starting points. Data-Driven Security by Jacobs &amp; Rudis is great for domain specific visualization. Yes, Mr. Tufte was once considered groundbreaking for his visualizations, but there are plenty of authors more in tune with current technology and methods of communicating data visually.</p>



<p><strong>The Bottom Line</strong></p>



<p>I could write a book on the topic of industry reports. I could, but it would be crap. Do expect more blog posts on the topic in the future; there&#8217;s still much more I could wax poetic about. Instead, I&#8217;d like to leave you with three questions an author should be asking as they begin the process of writing:</p>



<ul class="wp-block-list"><li>Who am I writing for? An executive rarely has time to read more than the introduction, while the red team wants all the juicy details of the latest attack type. Write appropriately for your audience.</li><li>What do I want them to walk thinking about? I cannot stress enough that if you haven&#8217;t communicated your primary message in the first 500 words, you&#8217;ve probably lost half your audience. If you can&#8217;t tell a reporter your why your publication is important to his audience, the chance of coverage for your story drops dramatically.</li><li>Have I communicated my findings well? Whether it&#8217;s the analysis or the graphics in a report, if they leave the reader confused, you&#8217;ve failed at your most important task.</li></ul>



<p>One last thing: A good editor is your best friend when it comes to writing! And like any good friend, they may sometimes tell you your baby is ugly. At least you can throw your first draft in the garbage and start over, unlike a baby.</p>
<p>The post <a href="https://mckeay.net/on-being-critical-of-industry-reports-in-security/">On being critical of industry reports in security</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">63</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>’50 Shades of Blue’ or ‘Red Hot Mess’ from CyberTheory</title>
		<link>https://mckeay.net/50-shades-of-blue-or-red-hot-mess-from-cybertheory/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=50-shades-of-blue-or-red-hot-mess-from-cybertheory</link>
		
		
		<pubDate>Thu, 11 Aug 2022 16:30:00 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[CSO]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[industry report]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[SEO]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=60</guid>

					<description><![CDATA[<p>Who should read this? Marketing and content creation teams might gain some insight from this report. It is primarily aimed at people trying to connect to CISOs after all. I would suggest that marketing teams skip straight to page 22 (or is it 39?) and the section titled 'Reaching Your Audience'. There are a significant number of 'Marketing Takeaways' that may contain nuggets of wisdom for their consumption. </p>
<p>The post <a href="https://mckeay.net/50-shades-of-blue-or-red-hot-mess-from-cybertheory/">&#8217;50 Shades of Blue&#8217; or &#8216;Red Hot Mess&#8217; from CyberTheory</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>My &#8216;Too Long; Did Read&#8217; review of the &#8216;<a href="https://cybertheory.io/ciso-engagement-and-decision-drivers-study/" target="_blank" rel="noreferrer noopener">CISO Engagement and Decision Drivers Study</a>&#8216; from <a href="https://cybertheory.io/about/" target="_blank" rel="noreferrer noopener">CyberTheory</a> is, by necessity, much more negative than I&#8217;m generally comfortable writing, but it truly deserves the treatment. Despite the title of the study, it barely talks about engagement with CISOs in any meaningful way. It might be useful to a Marketing team, but is almost impossible to decipher and misses its target. Due to the colors chosen for the plots and graphs of the report, any hope of the reader drawing intelligence from the study is quickly drowned in in a sea of blue ink.</p>



<p>To be clear, I&#8217;ve worked with and known much of the team at the <a href="https://www.cyentia.com/" target="_blank" rel="noreferrer noopener">Cyentia Institute</a> and respect them greatly. I&#8217;ve followed their work for years and know what they&#8217;re capable of. I wouldn&#8217;t spend the time needed to read the report from front to back and comment on it if I didn&#8217;t know, beyond a shadow of a doubt, they are capable of something much better than what&#8217;s shown in this report. Please look away, Wade and team!</p>



<p><strong>Overall Impression</strong> &#8211; When I review a report, I&#8217;m examining three aspects: A) What data is the report drawing on, B) How was the data analyzed, and C) How was the data visualized. I&#8217;m also looking at how it was laid out and edited, but that&#8217;s generally a minor part of my analysis. The CISO Engagement report fails, or nearly fails, on every one of these measurements. The data and the visualizations are rendered useless by the color choice, and the analysis is window dressing with key words thrown into the mix. I&#8217;m looking for guidance on how to use the data, rather than generic SEO feedback.</p>



<p>Who should read this? Marketing and content creation teams might gain some insight from this report. It is primarily aimed at people trying to connect to CISOs after all. I would suggest that marketing teams skip straight to page 22 (or is it 39?) and the section titled &#8216;Reaching Your Audience&#8217;. There are a significant number of &#8216;Marketing Takeaways&#8217; that may contain nuggets of wisdom for their consumption. </p>



<p>Security professionals should avoid reading this report. We&#8217;re not the target. If you&#8217;re interested to see what an SEO driven content team thinks will grab your attention, dive in. But you&#8217;d better like blue and cyan, because there are no other colors to choose from in the CISO Engagement study.</p>



<span id="more-60"></span>



<p><strong>The Good &#8211;</strong> The conclusions and reflections on page 29 have some good, if basic, feedback for marketing teams. I especially like the realization that &#8220;…campaign strategies lack an understanding of the subject matter, which leads to misperceptions…&#8221;. I&#8217;ve worked with good marketing teams who get this and engage subject matter experts for guidance. This is something to keep in mind no matter what industry you work in.</p>



<p>The examination of current events on article traffic (pg 17) is also a decent reminder to use the news to create traffic. Because the survey is drawing from ISMG&#8217;s data, I think this section fails to understand the difference between a news organization capitalizing on a breaking story and a vendor writing blog posts about how their product is the silver bullet for today&#8217;s disasters. This section deserves some careful thought; being involved with or acknowledging current events is generally a good idea. But the report fails to highlight how easy it is for a vendor to be seen as an ambulance chaser instead.</p>



<p>The cover is a pretty design. Which is where the positive feedback ends.</p>



<p><strong>The Bad &#8211;</strong> There&#8217;s a lot to unpack in the negative feedback I have. The data behind this report that could have been displayed and analyzed very different to make this report useful. Instead, any intelligence appears to have been drowned in favor of … something. I can&#8217;t rightly tell what the real purpose of the report is.</p>



<p>First off, the title. This report isn&#8217;t about CISO engagement. The first real mention of catching the attention of a Chief Information Security Officer doesn&#8217;t enter the report until page 26. Prior to that, it refers to &#8216;C-level executives&#8217;, and occasionally uses the acronym, but it&#8217;s rare. There are 48 uses of &#8216;CISO&#8217; in the text, with most (25) of those simply being in the title in the footer of each page. Subtle hint: if you want someone to read your report, actually make it about the topic you promised and put that content as close to the front as you can!</p>



<p>Page numbering is another problem with the report. While the front and back cover are presented in portrait mode, the rest of the report uses landscape mode. The way the pages are numbered, every internal page is marked by an even number, even though only a few actually make use of a two column format. This isn&#8217;t a 54 page report, it&#8217;s a 31 page PDF that&#8217;s pretending it was supposed to be printed.</p>



<p>The table of contents promises a research methodology page, which the report fails to deliver. Yes, it does show a simplistic breakdown of different elements of the data. However, this is nothing close to telling us where the data came from or how it was manipulated to create the plots and graphs for the report. Even if this self-aggrandizing pulp were considered insight into the data, it belongs at the end of the report. The first page of content should be reserved for a summary, a set of major talking points, a TL: DR, etc. In other words, hit them with your hook as quickly as you can, not with a dead trout.</p>



<p>By far, my biggest beef with this report is the choice of color. This report lost all credibility with the very first figure, on page 6 of the PDF. In the world of data visualization, color is used as a method of conveying information to the reader. This report strips out a vast majority of the information contained in colors, instead using shades of blue and cyan. </p>



<p>This goes far beyond my usual rant about using color blind friendly palettes! Quite frankly, figures 1 &amp; 2 are completely unreadable and a waste of their space and my time. Figure 2&#8217;s river plot is a travesty, with colors being reused repeatedly, which makes it impossible to draw conclusions from the visualization. The &#8216;observations&#8217; for the plot are on the next page and even say, &#8220;If you squint, you may be able to make out…&#8221;. No, even if you squint, they&#8217;re impossible to make out.</p>



<p>The blues look pretty, if slightly monochrome and repetitive. They also wash out any hope of making use of visualizations. Which is made worse because there&#8217;s little evidence the plots are related to the content in the first place. Please do research on palettes that are Color Blind Friendly for the next version of the report. David Nichols offers a good starting point in his <a href="https://davidmathlogic.com/colorblind/#%23D81B60-%231E88E5-%23FFC107-%23004D40" target="_blank" rel="noreferrer noopener">Coloring for Colorblindness</a> article.</p>



<p>The data itself is of questionable value to most readers. The parent organization of CyberTheory, ISMG, has well over a decade of data on the effectiveness of different formats. My concern is the data is more reflective of their support of the different formats than it is of general trends. Without a proper methodology segment, it would be easy to think this report was drawn from a wider pool of data.</p>



<p><strong>Overall &#8211;</strong> If you want guidance on SEO or content generation, read the various &#8216;Marketing Takeaways&#8217; sections. You shouldn&#8217;t have to squint to gain something from the visualizations, but that&#8217;s exactly what CyberThreat is asking you to do. In the report, in their own words, none the less. Simpler plots, better color choices, and analysis that draws conclusions for the reader would make for a vastly better version of the report in the future. Complex visualizations are great for data nerds, but the majority of the people targeted by this report don&#8217;t have the time, the energy, or the background to read a river plot or a dot plot at a glance. They shouldn&#8217;t have to.</p>



<p>I give the &#8216;CISO Engagement and Decision Drivers Study&#8217; a D-. It&#8217;s saved from receiving an F because of the Marketing Takeaways, but only by a slim margin. By the way, the Introduction promises &#8220;… the brands creating the most engagement from their Q1 content marking efforts.&#8221; I don&#8217;t see that delivered upon anywhere in the report.</p>
<p>The post <a href="https://mckeay.net/50-shades-of-blue-or-red-hot-mess-from-cybertheory/">&#8217;50 Shades of Blue&#8217; or &#8216;Red Hot Mess&#8217; from CyberTheory</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">60</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>Great information in need of polish from Meta</title>
		<link>https://mckeay.net/great-information-in-need-of-polish-from-meta/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=great-information-in-need-of-polish-from-meta</link>
		
		
		<pubDate>Tue, 09 Aug 2022 15:32:47 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Meta]]></category>
		<category><![CDATA[Social Media]]></category>
		<category><![CDATA[Social Media Attacks]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=51</guid>

					<description><![CDATA[<p>While the content of the report is excellent, it needs more copy editing and better layout.  It's clearly a labor of love by the technical teams at Meta, rather than a marketing team trying to make an impression.  This is aimed at a technical audience and not something you're likely to talking about with the CSO or other executives; they'll want you to do something with the information, not take their time with the specific</p>
<p>The post <a href="https://mckeay.net/great-information-in-need-of-polish-from-meta/">Great information in need of polish from Meta</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>My next review for &#8216;Too Long: Did Read&#8217; is Meta&#8217;s<a href="https://about.fb.com/news/2022/08/metas-adversarial-threat-report-q2-2022/" target="_blank" rel="noreferrer noopener"> Adversarial Threat Report, Second Quarter 2022. </a> I&#8217;d seen the ATR (best initialism I can think of) before and find the work by the Meta team to be exemplary in content, though it is far from the most polished report I&#8217;ve read.  I chose it large part because it is so very different from the PwC report I<a href="https://mckeay.net/?p=48#more-48"> reviewed last week</a>.</p>



<p><strong>Overall Impression &#8211;</strong> If you&#8217;re a defender looking for more information about the threats social media organizations face right now, this is definitely for you.  It has an appendix listing their public threat indicators at the end of the report that listing domains to block and Yara rules for your use.  The report uses a very simplistic layout, which is mostly in its favor.</p>



<p>The content has plenty of information for beginning and mid-career responders. It might not be as interesting to experienced defenders who have other avenues to get the same information.  If you&#8217;re in one of the many intelligence sharing groups in our industry, this information is probably already available to you. </p>



<p>While the content of the report is excellent, it needs more copy editing and better layout.  It&#8217;s clearly a labor of love by the technical teams at Meta, rather than a marketing team trying to make an impression.  This is aimed at a technical audience and not something you&#8217;re likely to talking about with the CSO or other executives; they&#8217;ll want you to do something with the information, not take their time with the specifics.</p>



<span id="more-51"></span>



<p><strong>The Good</strong> &#8211; Both the report and the blog post supporting it include the most important takeaways from the report right up front, as it should be.  They&#8217;ve taken the time to identify what you&#8217;re going to get from the report, which is often harder than you&#8217;d think.  The report is 36 pages long and without this summary, many readers might never do more than skim it and look at the appendix.  </p>



<p>I appreciate that the authors are credited up front and are clearly people in roles responsible for creating actionable intelligence internally and externally at Meta. The &#8216;Key Findings&#8217; points to which organizations and countries are involved in Coordinated Inauthentic Behavior (CIB), which is the type of call out we need to see more often.  </p>



<p>I found Sections 1, covering two South Asia networks, and the in-depth analysis of Cyber Front Z starting on page 20, to be the most valuable sections of the report, other than the Appendix.  Diving right into Bitter APT and APT38, as well as providing significant details hooks the reader and makes some of the less valuable content palatable.  The analysis of Cyber Front Z is just short of 1/3 of the total report, with screenshots and translations.  I really like the observation that Z Team is taking lunch breaks and weekends off.  </p>



<p><strong>The Bad &#8211;</strong> The editing of this report needed another round or two before it was published. Sections 2, 3, and 4 spend more time on defining terms than they do talking about the groups and attacks the report covers.  </p>



<p>I&#8217;m glad to see Meta explaining what they mean when they discuss emerging harms, but they use more real estate on those definitions than on the specific examples.  In Section 2, less than half contain examples.  Three of seven only works if you&#8217;re part of the Borg Collective. </p>



<p>Run-on and poorly parsed sentences interrupted my reading of the report.  As an example:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#8220;<em>We took action against a group of hackers — known in the security industry as Bitter APT — that operated out of South Asia, and targeted people in New Zealand, India, Pakistan and the United Kingdom</em>.&#8221;</p><cite>Meta ATR, Q2 &#8217;22, Section 1, page 5</cite></blockquote>



<p>It&#8217;s easy to read this sentence as Meta taking action against hackers -and- targeting people in New Zealand, etc.  Obviously not how it was meant! This might not bother some readers, but is just one example showing more editing was needed.</p>



<p><strong>Overall &#8211;</strong> Despite my editing issues with Meta&#8217;s Quarterly Adversarial Threat Report for Q2, 2022, it&#8217;s still well worth the time to read.  I appreciate teams who want to share their intelligence with a wider audience.  Even more, I appreciate seeing specific domains to be wary of.  If time is of the essence, flip to page 21 to read the In-Depth section, then come back to the rest when you can.</p>
<p>The post <a href="https://mckeay.net/great-information-in-need-of-polish-from-meta/">Great information in need of polish from Meta</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">51</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>PwC Survey – Decent report, too little analysis</title>
		<link>https://mckeay.net/pwc-survey-decent-report-too-little-analysis/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=pwc-survey-decent-report-too-little-analysis</link>
					<comments>https://mckeay.net/pwc-survey-decent-report-too-little-analysis/#comments</comments>
		
		
		<pubDate>Wed, 03 Aug 2022 15:54:23 +0000</pubDate>
				<category><![CDATA[TL: DR]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[industry report]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Survey]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=48</guid>

					<description><![CDATA[<p>I&#8217;m repurposing the initialism &#8216;TL: DR&#8217; to mean &#8216;Too Long: Did Read&#8217;. I have been writing industry reports since 2015 and reading them far longer, which gives me a wealth of experience to assess the content of industry reports so you don&#8217;t have to. I&#8217;m kicking off this series with the PwC&#8217;s Global Economic Crime [&#8230;]</p>
<p>The post <a href="https://mckeay.net/pwc-survey-decent-report-too-little-analysis/">PwC Survey &#8211; Decent report, too little analysis</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>I&#8217;m repurposing the initialism &#8216;TL: DR&#8217; to mean &#8216;Too Long: Did Read&#8217;.  I have been writing industry reports since 2015 and reading them far longer, which gives me a wealth of experience to assess the content of industry reports so you don&#8217;t have to. </p>



<p>I&#8217;m kicking off this series with the <a href="https://www.pwc.com/gx/en/services/forensics/economic-crime-survey.html" target="_blank" rel="noreferrer noopener">PwC&#8217;s Global Economic Crime and Fraud Survey 2022</a>.   I found this report while reading Lori MacVittie&#8217;s monthly newsletter, <a href="https://www.linkedin.com/pulse/july-jamboree-data-lori-macvittie/" target="_blank" rel="noreferrer noopener">The Tech Menagerie</a>.  As my friends in Boston would say, Lori is &#8216;wicked smaht&#8217; and someone you should follow.  Note: none of my friends actually talk like that unless they&#8217;re making fun of their own home town.</p>



<p><strong>Overall impression</strong> &#8211; This not a cybersecurity report, it&#8217;s a report for CFOs, CMOs, and other executives looking for information about fraud in the industry.  It&#8217;s worth reading for a security professional because it reflects the concerns those executives are worried about.  Survey data is one of my least favorite ways to build a report, but PwC is correct in framing this as opinions, rather than facts.</p>



<p>My key takeaway from the report is the rising concern about hackers and cybercrime among executives across all industries.  My key complaint is the lack of analysis in the report.  &#8216;Here&#8217;s the data&#8217; is different from &#8216;Here&#8217;s what the data means.&#8217;  I&#8217;d give this report a solid B, which could have been an A with additional analysis.</p>



<span id="more-48"></span>



<p><strong>The Good</strong> &#8211; This is a short and very pretty report, which makes it both readable and easy to consume.  There are multiple graphics in the report that can be used in a presentation to highlight specific topics.  The &#8216;Type of fraud experienced, by industry&#8217; image on page 6 could easily be used when talking to any number of industries to show how they compare to other industries. Similarly, the &#8216;Type of external perpetrator&#8217; bar chart on page 9 could be used in many presentations.</p>



<p>The report has two &#8216;In Focus&#8217; sections, the first on page 6, a second on page 9, which contain the most analysis in the report.  Rather than rephrase the plots in writing, both sections give additional insight into what the data means.  If you only have a couple of minutes to spare, read these sections first.</p>



<p>A personal concern of mine has long been to have both a methodology and a credit section, and this report has both.  Sort of.  There is a brief &#8216;About the survey&#8217; on page 13, appropriately sized for this report.  I&#8217;d like more details on the survey, but most readers wouldn&#8217;t be well served by such content. I&#8217;m not sure if the Contacts on page 14 is the same as a credits page, but it does give the reader someone to reach out to for more information.</p>



<p><strong>The Bad</strong> &#8211; My primary concern with this report is, once again, the lack of significant analysis in the majority of the report.  The worst example is page 5, which provides a bump out that&#8217;s disconnected from the majority of text and a plot that&#8217;s useful but devoid of any explanation or analysis.  </p>



<p>The title of the report is misleading, and the concept of a perimeter doesn&#8217;t enter the text until page 8.  Even then, the perimeter is poorly defined.  Some of this is because the target audience isn&#8217;t security professionals, but neither the data nor the analysis demonstrates a strong connection to this title.</p>



<p>The color scheme is interesting, with a mixture of reds, oranges, and greys.  Making plots and graphics accessible to readers who are color blind or color deficient is too often overlooked when developing reports.  I suspect anyone who is red-green color blind will have difficulty differentiating the data points in some of these plots.  The good news is that the majority of these plots are simple enough to be read without color being a major issue.</p>



<p><strong>Conclusion</strong> &#8211; PwC&#8217;s Global Economic Crime and Fraud Survey 2022 is worth downloading and spending 30 minutes with because it gives insight into what business leaders are thinking about.  It doesn&#8217;t draw many conclusions about the data or provide any earth-shaking conclusions, but it does give most readers decent data points to create their own analysis from.  I just wish the content could have fit the title better.</p>
<p>The post <a href="https://mckeay.net/pwc-survey-decent-report-too-little-analysis/">PwC Survey &#8211; Decent report, too little analysis</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mckeay.net/pwc-survey-decent-report-too-little-analysis/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">48</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>Daughter + Dad: Coming out as transgender</title>
		<link>https://mckeay.net/daughter-dad-coming-out-as-transgender/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=daughter-dad-coming-out-as-transgender</link>
					<comments>https://mckeay.net/daughter-dad-coming-out-as-transgender/#comments</comments>
		
		
		<pubDate>Mon, 01 Aug 2022 18:06:19 +0000</pubDate>
				<category><![CDATA[Personal]]></category>
		<guid isPermaLink="false">https://mckeay.net/?p=11</guid>

					<description><![CDATA[<p>This post was originally published on March 31, 2022 on the Snyk blog, Daughter + Dad: Coming Out As Transgender My daughter came out to my wife and me as a transgender individual nearly five years ago. It was a shocking revelation, as we’d always thought about her future in terms of male things, like [&#8230;]</p>
<p>The post <a href="https://mckeay.net/daughter-dad-coming-out-as-transgender/">Daughter + Dad: Coming out as transgender</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>This post was originally published on March 31, 2022 on the Snyk blog, <a href="https://snyk.io/blog/daughter-dad-coming-transgender/">Daughter + Dad: Coming Out As Transgender</a></p>



<p>My daughter came out to my wife and me as a transgender individual nearly five years ago. It was a shocking revelation, as we’d always thought about her future in terms of male things, like being a father. But that was not the road she needed to travel. Our job as her parents is to help her live the best life possible, even when it wasn’t what we expected.&nbsp;</p>



<p>I’ll refer to my daughter simply as ‘A’ for the rest of this article. She’s sitting next to me, helping to make sense of what we’ve been through. Putting this into words is helping me understand what she experienced and gives her more context about my experiences. More than anything, she wants people to understand that being trans is not a choice, it’s a realization that enables you to make sense of many things in hindsight.</p>



<h2 class="wp-block-heading"><strong>When did you know you were transgender?</strong></h2>



<p>A: There was no singular incident or experience that revealed to me that I am trans. It was more of an evolution that allowed me to make sense of other decisions and trends in my life. I never liked traditionally masculine things, like sports. I never felt the aggression some children display. But I wasn’t into things that are feminine or ‘girly’ either, so there wasn’t a defining “girl’s toys” childhood experience that made me realize things didn’t fit. I mostly just played video games or read, neither of which we saw as heavily gendered.&nbsp;</p>



<p>Martin: We’re a family of geeks. We like computers, board games, role playing and tons of other geeky things. We don’t place a lot of importance on what most people consider traditionally masculine or feminine roles. We also never considered our child might not like the gender she was assigned at birth.&nbsp;</p>



<p>A: There was nothing wrong with the life I was living, but there was a growing feeling of discomfort I felt being male. There was just a feeling slowly building in the background. It took me many years to understand what that tension was and to admit to myself that it wasn’t just a phase I’d outgrow. I spent many sleepless nights thinking about being trans, took every test on the internet I could find about being trans, but finally realized it’s who I am. By the way, all those tests suck; if you’re taking one of these tests, you probably already know the answer you want.</p>



<p>Being trans wasn’t a choice as my father thinks of it. It was an inevitability that existed outside of any choice I could make. I was trans, my only choice was to acknowledge it or continue to fight it my whole life.</p>



<h2 class="wp-block-heading"><strong>Coming out</strong></h2>



<p>A: Once I decided to come out to my parents, it was nerve wracking. The experience wasn’t everything I’d hoped it would be. I’d been thinking about being trans and revealing it to them for years. I’d hoped they would celebrate the decision with me. My parents didn’t do that.</p>



<p>They asked me questions like, “Are you sure? Is this just a phase? Can you put this decision off until after college?” They didn’t reject me, cast me out, or make me experience any of the worst case scenarios others have had to deal with, but they also didn’t immediately accept who I am, and it hurt.</p>



<p>Martin: We were scared, there’s no other way to put it. Our child had just told us they wanted (or needed) to change their gender, and that they were no longer going to follow major parts of the life plan we expected from them. We were confused.&nbsp;</p>



<p>We could have handled the situation better, but we did the best we could based on our own life choices. Both my wife and I are comfortable with traditional gender roles and learning our child was going to eschew those roles in favor of something that is guaranteed to make their life more difficult was a hard adjustment to make. As were a thousand other factors, not the least of which was a new name and pronoun.</p>



<p>A: I would have kept the name you gave me if it had been gender-neutral!</p>



<h2 class="wp-block-heading"><strong>How do you feel now?</strong></h2>



<p>A: One of the biggest aides to my mental health was finding a group of people who were also trans or LGBTQ+ to hang out with at college. Surrounding myself with people who are friends, who don’t have the implied judgment of my parents, who have had similar experiences was a big relief as I explored my new life. I didn’t have to perform for them like I felt I needed to for the rest of the world.&nbsp;</p>



<p>I was honestly a little resentful of my parents for not immediately accepting my coming out. My parents have worked hard at using the right pronoun and name, which helps a lot. At first my nerves were open and raw when people used the wrong gender or name. As time goes by and I’m more comfortable in my own body, I’m growing less sensitive to those mistakes — and, thankfully, they happen less and less often.</p>



<p>Martin: I dislike being constantly corrected, and for the first year after her revelation, I had to be corrected in my use of name and pronoun almost every day. I didn’t have the time to adjust to the thought of having a daughter that she’d had, and resented having to adjust everything I’d framed my mental image of my child around. It was HARD!</p>



<p>But I had to learn, had to adjust, had to make room for her to be who she is. I have a life of my own, I can’t force her to be the person I thought she should be. This is her life, to make the best of, to make mistakes in, and to learn from. I can’t take this away from her. So I changed my thoughts, my words, my actions. Eventually.</p>



<h2 class="wp-block-heading"><strong>Lessons learned</strong></h2>



<p>A: I understand why my parents were scared; it’s a scary, scary world for trans people. That’s not their fault or mine, it’s just the way it is. I don’t like it that way, and believe we have a responsibility to change it. The political and legal machinations we see every day are aimed at making it harder to be trans. Internationally, there are significant efforts to curtail the rights of transgender individuals. Wherever there are efforts that impact the rights of trans individuals, to make it harder to come out, or to make being trans illegal, we need to take action and defend trans and LGBTQ+ rights as a whole. I want the world to be better than it is, not simply accept that some things cannot be changed.</p>



<p>Martin: Parenting is hard! Even under the best of circumstances, raising a child is difficult and has never been done perfectly in the history of humanity. And yet, somehow we continue, generation after generation.</p>



<p>Having my worldview upended over the course of a 30 minute conversation was painful. Both my wife and I have made mistakes in dealing with the new reality of having a trans child. We’ve done our best, but sometimes that’s not enough. I hope other parents in the same circumstances understand that it’s okay to falter, to have doubts about your child’s evolution, to wish for a return to the path you had always envisioned for our child. But you also have to provide support, realize it’s their life, and our job as parents is to be there for them through a very stressful experience.</p>



<p>Our understanding of what we thought the future would bring was turned upside-down. The best thing I can do is reassure my daughter I’ll always love them, no matter what gender they are. We’re slowly finding a new baseline for our relationship.</p>



<p>Both: Thank you for reading this to the end. It was more emotionally difficult and draining than either of us imagined it would be. We also learned a lot writing it and hope you did too. This article barely scratches the surface of what it means to be trans or have a trans child. We intentionally kept to the surface levels of the experience, it’s a still evolving story we may add more detail to in the future.</p>
<p>The post <a href="https://mckeay.net/daughter-dad-coming-out-as-transgender/">Daughter + Dad: Coming out as transgender</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://mckeay.net/daughter-dad-coming-out-as-transgender/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
		<item>
		<title>Once more unto the breach, dear friends!</title>
		<link>https://mckeay.net/hello-world/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=hello-world</link>
		
		
		<pubDate>Mon, 01 Aug 2022 16:13:26 +0000</pubDate>
				<category><![CDATA[Personal]]></category>
		<guid isPermaLink="false">http://box2218/cgi/addon_GT.cgi?s=GT::WP::Install::EIG+%28mckeayne%29+-+10.0.87.62+%5BWordpress%3b+/var/hp/common/lib/Wordpress.pm%3b+549%3b+Hosting::gap_call%5D/?p=1</guid>

					<description><![CDATA[<p>Welcome to the latest iteration of the Network Security Blog! I have been blogging in one form or another since early 2000, first creating a hand coded page, then Moveable Type, and several versions of WordPress. I mostly abandoned the blog in favor of writing for my employer in 2016 (Hello, State of the Internet [&#8230;]</p>
<p>The post <a href="https://mckeay.net/hello-world/">Once more unto the breach, dear friends!</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Welcome to the latest iteration of the Network Security Blog!  I have been blogging in one form or another since early 2000, first creating a hand coded page, then Moveable Type, and several versions of WordPress.  I mostly abandoned the blog in favor of writing for my employer in 2016 (Hello, State of the Internet Security report!) but it&#8217;s now time to pick up the quill again for my own entertainment.  </p>



<p>Unluckily, much of what I wrote before was unrecoverable, or at least I haven&#8217;t figured out how to recover it yet.  I&#8217;ll keep at it, so you may see old posts  coming back to live.  And when I reread those archival posts, you might be able to see my blush from orbit.  What was I thinking, those 20 years ago!?</p>



<p>I hope you&#8217;ve enjoyed my past writing and look forward to sharing my thoughts once again.</p>
<p>The post <a href="https://mckeay.net/hello-world/">Once more unto the breach, dear friends!</a> appeared first on <a href="https://mckeay.net">Network Security Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1</post-id>	<dc:creator>netsecpodcast@mckeay.net (Martin McKeay)</dc:creator></item>
	</channel>
</rss>