<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7425230117947821661</atom:id><lastBuildDate>Thu, 22 Feb 2024 08:58:51 +0000</lastBuildDate><category>Quick comment</category><category>IFTTT</category><category>Augusto Barros</category><category>out of the box</category><category>risk management</category><category>Security Market</category><category>security management</category><category>trends</category><category>vulnerability management</category><category>security research</category><category>security standards</category><category>tools</category><category>application security</category><category>trojans</category><category>security monitoring</category><category>RSA</category><category>network security</category><category>vulnerabilities</category><category>botnets</category><category>new vulnerability</category><category>pci</category><category>Brazil</category><category>Logs</category><category>virtualization</category><category>encryption</category><category>insider threat</category><category>microsoft</category><category>pentesting</category><category>vulnerability</category><category>Windows</category><category>behavioralecononomics</category><category>blind spots</category><category>decision making</category><category>malware</category><category>pentest</category><category>siem</category><category>ROSI</category><category>compliance</category><category>honeytokens</category><category>security</category><category>Apple</category><category>Canada</category><category>black swan</category><category>blog</category><category>cissp</category><category>dlp</category><category>heartland</category><category>research</category><category>risk assessment</category><category>vmware</category><category>vulnerability research</category><category>NAC</category><category>article</category><category>basics</category><category>log management</category><category>mainframe</category><category>methodologies</category><category>metrics</category><category>mqseries</category><category>security awareness</category><category>sql injection</category><category>windows security</category><category>worms</category><category>(isc)2</category><category>APT</category><category>ISO27002</category><category>Mainframe security</category><category>Outlook</category><category>SCADA</category><category>adobe</category><category>antivirus</category><category>architecture</category><category>assumptions</category><category>auditors</category><category>behaviour</category><category>best practices</category><category>blackhat</category><category>blogs</category><category>budget</category><category>certifications</category><category>cloud</category><category>cryptography</category><category>dbir</category><category>defcon</category><category>doghouse</category><category>economics</category><category>google</category><category>incident response</category><category>internet banking fraud</category><category>mcaffee</category><category>patch management</category><category>patches</category><category>regulations</category><category>responsible disclosure</category><category>risk perception</category><category>sans</category><category>security intelligence</category><category>security metrics</category><category>server core</category><category>snake oil</category><category>sox</category><category>threat detection</category><category>threat intelligence</category><category>threat modelling</category><category>threat oriented security</category><category>threats</category><category>150</category><category>2009</category><category>2009 predictions</category><category>Amrit Williams</category><category>Availability</category><category>Axur</category><category>BSIMM</category><category>CAG</category><category>Common Criteria</category><category>Dan Geer</category><category>Feedly</category><category>Firefox</category><category>France</category><category>IE vulnerability</category><category>ISO15408</category><category>Job</category><category>Martin McKeay</category><category>Mike Murray</category><category>MitB</category><category>Petrobras</category><category>RANCID</category><category>Recently Read</category><category>Rich Mogull</category><category>Richard Stiennon</category><category>SSL test</category><category>Sao Paulo</category><category>Schneier</category><category>TCG IF-MAP</category><category>Toronto</category><category>War</category><category>Windows 2008 Server</category><category>Windows 7</category><category>XML</category><category>Zoundry</category><category>aba</category><category>access control</category><category>access management</category><category>activex</category><category>adaptative authentication</category><category>adaptative authorization</category><category>akamai</category><category>analogies</category><category>analytics</category><category>appliances</category><category>application level attacks</category><category>applocker</category><category>april fool</category><category>articles</category><category>assembly</category><category>attack</category><category>attack vector risk management</category><category>attacks</category><category>authentication</category><category>awareness</category><category>balance</category><category>bank security</category><category>bank trojans</category><category>banks</category><category>bejtlich</category><category>blended threats</category><category>bloggers</category><category>bob carr</category><category>book</category><category>bots</category><category>breach reporting</category><category>browsers</category><category>brute force</category><category>bsi-mm</category><category>bsideslv</category><category>business continuity</category><category>cansecwest</category><category>card data</category><category>cardsystems</category><category>certificates</category><category>certification</category><category>choicearchitecture</category><category>cisco</category><category>citrix</category><category>client security</category><category>cloud computing</category><category>cloud security</category><category>cmmp</category><category>cobit</category><category>cognitive biases</category><category>cold boot</category><category>complexity</category><category>conferences</category><category>conficker</category><category>controls</category><category>coso</category><category>cost center</category><category>cost/benefit</category><category>criminal activity</category><category>cso</category><category>cyberterrorism</category><category>cyberwar</category><category>dan kaminsky</category><category>data centers</category><category>data classification</category><category>data leak</category><category>data leaks</category><category>database security</category><category>debian</category><category>defense</category><category>deperimeterization</category><category>deputies</category><category>digital signatures</category><category>dilbert</category><category>disruptive innovation</category><category>distributed</category><category>dmz</category><category>dns</category><category>dunbar&#39;s number</category><category>economic obfuscation</category><category>endpoint security</category><category>exceptions</category><category>exploit</category><category>extrusion detection</category><category>facebook</category><category>federation</category><category>field assessed securiry</category><category>fireeye</category><category>firewall</category><category>firewalls</category><category>fix</category><category>flash</category><category>fraud</category><category>friends</category><category>fud</category><category>fun</category><category>gartner</category><category>google wave</category><category>grc</category><category>groupthink</category><category>hacked</category><category>hacking</category><category>haiti</category><category>helpdesk</category><category>hoff</category><category>honeytoken</category><category>hutton</category><category>ibm</category><category>incidents</category><category>information classification</category><category>insiders</category><category>integration</category><category>intrusion detection</category><category>intrustion detection</category><category>investment</category><category>ips</category><category>iso27001</category><category>issa</category><category>issap</category><category>java</category><category>kaminsky</category><category>keep-alive</category><category>laptop theft</category><category>law</category><category>lawsuit</category><category>libraries</category><category>linux</category><category>local admin</category><category>log analysis</category><category>login script</category><category>losses</category><category>low haning fruit</category><category>lxlabs</category><category>m&amp;a</category><category>mac</category><category>malware analysis</category><category>man in the browser</category><category>master</category><category>matasano</category><category>md5</category><category>merrick</category><category>messaging security</category><category>mobile</category><category>monitoring</category><category>mq</category><category>ms08-067</category><category>network shares</category><category>new kids on the block cipher</category><category>new threats</category><category>nmap</category><category>octave</category><category>online banking</category><category>oracle</category><category>os wars</category><category>ospf</category><category>paretto</category><category>passwords</category><category>patching</category><category>pci-dss</category><category>pdf</category><category>pete lindstrom</category><category>pgp</category><category>phb factor</category><category>phishing</category><category>planning</category><category>polaris</category><category>policies</category><category>portknocking</category><category>predictions</category><category>procedures</category><category>productivity</category><category>psi</category><category>pvlan</category><category>pwn2own</category><category>red team</category><category>redteam</category><category>reputation</category><category>risk</category><category>roi</category><category>ross anderson</category><category>saas</category><category>salesforce</category><category>sandbox</category><category>savvis</category><category>sdlc</category><category>search</category><category>sec</category><category>security framework</category><category>security managers</category><category>security models</category><category>security planning</category><category>security policy</category><category>security professional</category><category>security rants</category><category>security reputation</category><category>security strategy</category><category>security testing</category><category>security theater</category><category>security thinking</category><category>server</category><category>siems</category><category>smb</category><category>soa security</category><category>software monocultures</category><category>standards</category><category>stuxnet</category><category>survival bias</category><category>task</category><category>taxonomy</category><category>termination</category><category>the cloud</category><category>third parties</category><category>threat</category><category>time-bomb</category><category>tlbpov factor</category><category>togaf</category><category>tokenization</category><category>trust</category><category>twitter</category><category>two-factor authentication</category><category>unbreakable</category><category>unsecure economies report</category><category>vendor independence</category><category>vendor security</category><category>vendors</category><category>veris</category><category>verizon</category><category>videos</category><category>viruses</category><category>vm</category><category>vp</category><category>wap</category><category>web applications</category><category>webinar</category><category>websphere mq</category><category>wireless</category><category>workstation</category><category>workstations</category><category>worm</category><category>ysts</category><title>Security Balance - Augusto Barros</title><description>Augusto Paes de Barros blog on many things cybersecurity. </description><link>http://blog.securitybalance.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>546</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-6685706129418777508</guid><pubDate>Tue, 06 Jun 2023 19:29:00 +0000</pubDate><atom:updated>2023-06-06T15:29:48.771-04:00</atom:updated><title>Risk or Threat Oriented Security: Which Path Should We Choose?</title><description>Lately, I&#39;ve been engaged in various discussions about what should drive our security efforts: risk or threats. It&#39;s an interesting debate, and today I want to explore it with you in a more engaging and enjoyable way.&lt;br /&gt;&lt;br /&gt;Let&#39;s start with the risk-based approach. Ideally, this is the way to go. It involves identifying the key assets and evaluating the likelihood and potential impact of negative events to them. We often refer to these key assets as the &quot;Crown Jewels.&quot; By understanding the likelihood and impact of those bad events, we can allocate appropriate resources to protect them effectively.&lt;br /&gt;&lt;br /&gt;On the other hand, there&#39;s the threat-oriented perspective. Here, the focus is less on identifying the potential impact and likelihood of events and more on pinpointing threat activity that is likely to target our organization. For instance, organizations adopting a threat-oriented view would identify the most common malware families affecting similar organizations and implement controls to prevent, detect, and respond to them.&lt;br /&gt;&lt;br /&gt;Big parenthesis here; talking about threat vs risk doesn’t make much sense from a purist point of view, as threat is part of risk. But for simplification purposes, I’d say that the “risk oriented” view is focused on key assets, while “threat oriented” is focused on threats.&lt;br /&gt;&lt;br /&gt;So, while risk-based efforts revolve around safeguarding high-impact assets, threat-based efforts emphasize countering prevalent threats. The typical security operations professionals tend to prefer the threat-based approach. They observe a direct correlation between the perceived threats and incidents, leading them to concentrate on malware prevention, threat intelligence acquisition, and detection techniques.&lt;br /&gt;&lt;br /&gt;Conversely, data security professionals, security architects, and risk managers are usually more inclined toward the risk-based approach. They want to first identify what truly matters and needs protection and then design controls around those assets. This approach helps optimize efforts by focusing resources on mitigating risks instead of wasting them on prevalent but relatively harmless threats.&lt;br /&gt;&lt;br /&gt;The &quot;threat team&quot; argues that it makes sense to protect against the activity they observe, regardless of the nature and location of the key assets. For them, the effort of identifying key assets takes too long and is never accurate enough to be useful.&lt;br /&gt;&lt;br /&gt;Both teams aim to optimize efforts, but they take different approaches. So, why the disparity?&lt;br /&gt;&lt;br /&gt;The choice between risk and threat orientation depends on several variables, such as the type and size of the business, the potential classes of impact, and even the profile of the security team. Asking a team with a background in security operations to work in a risk-based manner might not yield the best results, just as asking data security or risk managers to operate in a threat-oriented fashion might not be as effective.&lt;br /&gt;&lt;br /&gt;Adopting a risk-based mindset helps us avoid the trap of pursuing absolute security or overspending on protection. On the other hand, threat orientation ensures that our security measures align with real-world threat activity observed in other organizations.&lt;br /&gt;&lt;br /&gt;Striking a balance is crucial. This debate can only yield a wrong answer when it tries to find a definitive, one-sided solution.&lt;br /&gt;&lt;br /&gt;From my personal perspective, the threat-based approach has always appeared more pragmatic. However, there are many edge cases where it may result in unnecessary efforts or misguided focus. If I had to provide a single answer, I would suggest: &lt;br /&gt;&lt;br /&gt;&lt;i&gt;&lt;b&gt;&quot;Do it in a threat-based manner, but always conduct a sanity check considering your key processes and assets.&quot;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;Now, I&#39;d love to hear your thoughts. How would you approach this challenge?&lt;br /&gt;</description><link>http://blog.securitybalance.com/2023/06/risk-or-threat-oriented-security-which.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-2040782596434953430</guid><pubDate>Tue, 14 Dec 2021 20:46:00 +0000</pubDate><atom:updated>2021-12-14T15:57:46.252-05:00</atom:updated><title>Log4J everywhere</title><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiupaMcpIjuO6gtJyvSZ2q0CrVBv0VXhIz2kTPLq1GXjUQLt6GKAsO6PPGoiSp6ZHHG_2RBHo0KLwWo4VDV-NGLWxeYbCTM_k0jSFOgrWvZ4pkXT7SeAKi6dFML0el6QHV2oXLLnzlQyCqn61kOa18SbzcyhBTlMqkEMqAUv0_Zu_4JxcvYh39-vaaC=s720&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;720&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEiupaMcpIjuO6gtJyvSZ2q0CrVBv0VXhIz2kTPLq1GXjUQLt6GKAsO6PPGoiSp6ZHHG_2RBHo0KLwWo4VDV-NGLWxeYbCTM_k0jSFOgrWvZ4pkXT7SeAKi6dFML0el6QHV2oXLLnzlQyCqn61kOa18SbzcyhBTlMqkEMqAUv0_Zu_4JxcvYh39-vaaC=s320&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://blog.securitybalance.com/2021/12/log4j-everywhere.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEiupaMcpIjuO6gtJyvSZ2q0CrVBv0VXhIz2kTPLq1GXjUQLt6GKAsO6PPGoiSp6ZHHG_2RBHo0KLwWo4VDV-NGLWxeYbCTM_k0jSFOgrWvZ4pkXT7SeAKi6dFML0el6QHV2oXLLnzlQyCqn61kOa18SbzcyhBTlMqkEMqAUv0_Zu_4JxcvYh39-vaaC=s72-c" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-5958715572958253146</guid><pubDate>Thu, 14 Oct 2021 21:34:00 +0000</pubDate><atom:updated>2021-10-14T17:34:55.542-04:00</atom:updated><title>Cybersecurity Is Not A Pair Of Sneakers</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&quot;Just do it&quot; does not work for cybersecurity.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;I&#39;ve seen many comparisons with very complex things we&#39;ve managed to accomplish. Man on the Moon, robots on Mars, etc. &quot;We&#39;ve manged to do all those things, how come there are still breaches happening?&quot;. Why can&#39;t we take a &quot;just do it&quot; approach for cybersecurity?&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;Well, for many reasons.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;First, resources available. The cost of the Apollo program was around $257 BILLION (inflation adjusted). That was all spent on a very specific, point in time objective, to put a man on the Moon. Some might say we&#39;ve been spending close to that every year on security, but that&#39;s for the entire global cybersecurity market. Project Apollo built only 15 flight-capable Saturn V rockers.&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF90s7uBnKJWoW1mYLlU45RtWjNVxsQ4FMnlANE-moyiJk6JJbyippUeIG5qFS56FyXJR71h01j4ugiLAsq7Y8qP6bdZiI674AzeHivMdSHv-XIzZgLc_dKhChBF81aj1pgqwkcDCrrZY/&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;2048&quot; data-original-width=&quot;1638&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF90s7uBnKJWoW1mYLlU45RtWjNVxsQ4FMnlANE-moyiJk6JJbyippUeIG5qFS56FyXJR71h01j4ugiLAsq7Y8qP6bdZiI674AzeHivMdSHv-XIzZgLc_dKhChBF81aj1pgqwkcDCrrZY/&quot; width=&quot;192&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;The Saturn V Rocket&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;The world spends hundreds of billions in cybersecurity every year, but that money is to cover all organizations out there. There&#39;s an estimate of 300 million business worldwide. Of course, the majority are SMB, but that means the annual average expense in cybersecurity is less than a thousand dollars. There is a lot of money on this business, but it is spread thin and unevenly.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;Second, it is a moving target. All the technology and ingenuity embarked on the Curiosity rover is impressive, a feat of engineering. It came with a $2.5B price tag, and it has been performing remarkably well. But how successful would Curiosity be if we just decided to drop it in Venus? Or Jupiter?&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4Zqe6csks0znqHUwJ4yTt1RC_toRTUJa51V-K9CDLhN_IElXJBeJTFeI7aqsiI0175uOALH4J5w9iRqv0thyCcYiJoBcVQ3hbQUOMVCahu8NIWpKEOmzWsWOb_E8lUcM06sV4FTOK5V8/&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;717&quot; data-original-width=&quot;520&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4Zqe6csks0znqHUwJ4yTt1RC_toRTUJa51V-K9CDLhN_IElXJBeJTFeI7aqsiI0175uOALH4J5w9iRqv0thyCcYiJoBcVQ3hbQUOMVCahu8NIWpKEOmzWsWOb_E8lUcM06sV4FTOK5V8/&quot; width=&quot;174&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;The Curiosity Mars Rover&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Venus atmosphere is extremely hot and dense. The surface level pressure is almost a hundred times Earth&#39;s atmosphere or almost 20.000 times Mars atmosphere. To make things worse, there are cloud of highly corrosive sulfuric acid. As advanced as the Mars rover is, it wouldn&#39;t survive in Venus.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;In cybersecurity we are often judged by how well our Mars rovers perform in Venus like environments. The conditions where the technology operates change dramatically. Look at all the technology changes we&#39;ve been experiencing in the last 20 years. We are talking about a period when Amazon, Google and Facebook surged from startups to corporate behemoths, smartphones and tablets became ubiquitous and the web moved from 1 to 2.0 and then to the cloud. The field where cybersecurity plays now is different than what it was in 2015, 2010 or 2001. Have we managed to &quot;solve the security problem&quot;? We would do extremely well playing in that 2001, maybe even the 2010 scenario but the goalposts have moved from there and are still moving ahead.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;And last, the major issue we face, the &quot;sentient adversary&quot;. What does that mean? It means we are not solving a fixed problem. From a problem domain perspective, we are not dealing with engineering, it is game theory. We have a non-zero-sum game to deal with. Our &quot;problem&quot; has smart people on the other side, with motivations and constantly developing new strategies to win. Together with the changing playing field from point #2, it makes a considerable challenge. The problem today is not the same as yesterday, and it will be different tomorrow as well. The adversaries think &quot;outside the box&quot;, putting cybersecurity in a domain where it can&#39;t be solved even by existing AI bleeding-edge technology. The adversary puts cybersecurity in the same realm as crime and terrorism. We can&#39;t just &quot;solve it&quot;.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&quot;Just Do It&quot; may work as a sneakers slogan, but for cybersecurity, the approach must be different.&amp;nbsp; In this space what we need is the OODA loop: Observe, Orient, Decide, Act*. Not as catchy, but it gives a chance to survive to fight another day.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;* &lt;i&gt;For cybersecurity I like to use &quot;Adapt&quot; instead of &quot;Act&quot;, but the spirit is the same.&lt;/i&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://blog.securitybalance.com/2021/10/cybersecurity-is-not-pair-of-sneakers.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF90s7uBnKJWoW1mYLlU45RtWjNVxsQ4FMnlANE-moyiJk6JJbyippUeIG5qFS56FyXJR71h01j4ugiLAsq7Y8qP6bdZiI674AzeHivMdSHv-XIzZgLc_dKhChBF81aj1pgqwkcDCrrZY/s72-c" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-5025971597837655703</guid><pubDate>Fri, 08 Oct 2021 14:25:00 +0000</pubDate><atom:updated>2021-10-08T10:25:55.932-04:00</atom:updated><title>Do Not Look For A Root Cause</title><description>&lt;p&gt;&lt;span style=&quot;background-color: white; color: rgba(0, 0, 0, 0.9); font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; white-space: pre-wrap;&quot;&gt;Reading about root cause analysis (RCA) for security breaches really freaks me out.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;Root causes are behind accidents and other unintentional events. Not breaches.&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;Do you want to know the root cause of a breach? No, it is not a vulnerability that was left unpatched. If you follow the chain of events, someone decided to look for it, assembled a plan of attack, was driven by a motivation...all that at the attacker side. &lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;Defence should look at breaches from a multi-factor point of view. Many things have to go wrong for an attack to be successful and cause harm. You may have a vulnerability providing initial access, but what about allowing privileged access? Lateral movement? Exfiltration, or mass encryption for impact? And why weren&#39;t you able to detect and respond to each one of those steps?&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;Post-mortem analysis usually take the approach of looking at multiple points and is better suited for security incidents. I usually do not like to use project management techniques for security needs, but on this case, I believe it makes sense. &lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;--artdeco-reset-typography_getfontsize: 1.6rem; --artdeco-reset-typography_getlineheight: 1.5; background-color: white; border: var(--artdeco-reset-base-border-zero); box-sizing: inherit; color: rgba(0, 0, 0, 0.9); counter-reset: list-1 0 list-2 0 list-3 0 list-4 0 list-5 0 list-6 0 list-7 0 list-8 0 list-9 0; cursor: text; font-family: -apple-system, system-ui, system-ui, &amp;quot;Segoe UI&amp;quot;, Roboto, &amp;quot;Helvetica Neue&amp;quot;, &amp;quot;Fira Sans&amp;quot;, Ubuntu, Oxygen, &amp;quot;Oxygen Sans&amp;quot;, Cantarell, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Apple Color Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Emoji&amp;quot;, &amp;quot;Segoe UI Symbol&amp;quot;, &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; line-height: var(--artdeco-reset-typography_getLineHeight); margin: 0px; padding: 0px; vertical-align: var(--artdeco-reset-base-vertical-align-baseline); white-space: pre-wrap;&quot;&gt;In short, no RCA for your breaches. Take a broader approach and perform a post-mortem analysis.&lt;/p&gt;</description><link>http://blog.securitybalance.com/2021/10/do-not-look-for-root-cause.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-2037224247386921860</guid><pubDate>Fri, 07 May 2021 16:39:00 +0000</pubDate><atom:updated>2021-05-07T12:39:12.456-04:00</atom:updated><title>Professional Certifications, Reboot!</title><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;After two months and a few hundred dollars later, my most recent personal project is completed. 10 years after my TOGAF9 certification, I decided to play the test taker again and obtain a new batch of professional certifications: AWS Certified Cloud Practitioner, AWS Certified Security Specialty and Microsoft Certified: Azure Fundamentals.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.credly.com/users/augusto-barros&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img data-original-height=&quot;340&quot; data-original-width=&quot;2084&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEH7C6eNqkk0HpXvYEOLDyEHQXSp2wDiIAiNrD06bfUPsAJqV4p8iXqbU_vseRaZ9SyX4zCRWVaTSMs4-SG7QkWxKZ4iacZQR5W9JFKHClBM1RAVme7IRqxNNRNMYXezN4kKkBW1aVUp8/w603-h98/image.png&quot; width=&quot;603&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;I didn&#39;t need these certifications for my current job, and I&#39;m not looking for a new one either, so this is not about job requirements or job hunting. So why did I do it?&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;I did it because I could do it :-) Well, ok, let me elaborate a bit. My career has been slowly moving away from more technical roles, and that&#39;s reducing my direct, hands on contact with technology. I don&#39;t think this is a bad thing, but as someone with the technical background, I miss that deeper understanding of the things I need to talk and write about.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;At the same time, I do not have the same drive to learn things that I do not have an immediate need for, learning just for the sake of learning. I still love learning new things, but that youth drive of building labs and labs for learning things we may never touch as part of our job is just not there anymore. Putting a target like a certification in front of me (and paying for it) seems to be an effective way to trigger my brain into &quot;I need to learn this&quot; mode. I learned many things in the past while preparing for getting certs, so I thought I could use the same method again. It was nice, it worked well for this intent.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;Cloud adoption keeps growing and cloud is directly affecting the work of anyone in security these days. It&#39;s not different for me: I work for a &lt;a href=&quot;https://www.securonix.com/&quot;&gt;Cloud SIEM vendor&lt;/a&gt;, and we are bringing many innovations to the SIEM space that are directly related to cloud. Securonix recently announced &lt;a href=&quot;https://www.securonix.com/resources/bring-your-own-aws/&quot;&gt;&quot;Bring Your Own Cloud&quot;&lt;/a&gt;, for example, and it is deeply rooted in AWS offerings, so it seemed natural to me that I should put a couple of AWS certs in my project. AWS Cloud Practitioner helped me learn more about the very broad range of offerings from AWS, and the security specialty was useful to provide more depth to my understanding of cloud threats and cloud security controls.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;In addition to the AWS certs, I wanted to add the (ISC)2 CCSP to the mix as well. I checked the domain of knowledge of the cert, ran through a few practice exams and noticed I already had most of the skills and knowledge required to pass it. So why didn&#39;t I do it? Because it&#39;s freaking expensive! USD600 is beyond any reasonable justification for a simple multiple-choice exam. Maybe I would take it if I was looking for a job like cloud security architect, or even as a CISO for a company with a strong cloud presence, but just for the fun of doing it? No, I&#39;m sorry, it doesn&#39;t make any sense.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;An Azure cert was a natural choice to complete my project. AWS and Azure are by far the most visible cloud providers (sorry Google!), so going through the process for both looked like the best choice.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;There are a few things I noticed during this exercise that I think it&#39;s worth sharing. First, it confirmed to me that test taking talent is really a thing. I&#39;m a helluva test taker. I&#39;m not bragging; apart from helping me pass tests and exams easily, it doesn&#39;t provide me with any real competitive advantage &quot;on the job&quot;. I&#39;ve always been like that and was happy to see I haven&#39;t lost it after so many years without sitting for a test. I didn’t spend more than a handful of hours reading for the full project. I don’t feel nervous and even have fun while taking the tests, so everything was a fun experience.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;But when you are a hiring manager and you see those certs in a resume, it&#39;s always important to find out if those certs came from real experience or just from good test taking skills (or worse, memorizing those awful brain dumps).&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;Don&#39;t get me wrong, it doesn&#39;t mean that certs on a resume means nothing. Remember, the main reason for me to do it was to force me into learning something about those technologies. Even if I don&#39;t have the hands-on experience the test developers were trying to verify with these exams, I still had to at least read a bit and get solid understanding of the basic concepts.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;Talking about basic concepts...if you want to get certs, LEARN THE F* BASICS! You can&#39;t believe the number of questions I was able to answer because of basic stuff, not necessarily tied to those specific cloud providers. If you know how crypto works, for example, a lot of the AWS security specialty questions will be very easy to answer. Same thing for networking and network security. AWS security groups, network ACLs, Azure network security groups...those are straightforward to learn when you know those things well. I didn&#39;t take the real CCSP, but the practice questions I&#39;ve done indicate that CISSP level concepts would put more than half of way behind you on that one.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;Finally, some interesting bits about AWS and Azure I was able to notice:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;caret-color: rgba(255, 255, 255, 0.847); font-family: Calibri, sans-serif; font-size: 12pt; margin: 0cm 0cm 0cm 36pt; text-indent: -18pt; text-size-adjust: auto;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Knowing the basics of one of those means you have almost all the basics of the other. Key concepts are virtually identical.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;caret-color: rgba(255, 255, 255, 0.847); font-family: Calibri, sans-serif; font-size: 12pt; margin: 0cm 0cm 0cm 36pt; text-indent: -18pt; text-size-adjust: auto;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;The naming convention of Azure is AWESOME. It&#39;s very easy to know what products and services do just from their names. They may not sound as sexy as &quot;Athena&quot;, &quot;Glacier&quot;, or high tech as “S3”, “EC2”, but they tell you in a very simple manner what they are about.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;caret-color: rgba(255, 255, 255, 0.847); font-family: Calibri, sans-serif; font-size: 12pt; margin: 0cm 0cm 0cm 36pt; text-indent: -18pt; text-size-adjust: auto;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;Both services are evolving so fast it&#39;s hard to keep study material, documentation and questions aligned and up to date on the latest offerings. Don&#39;t be surprised to see questions about things you didn&#39;t see in your study material. Check some of the announcements and blog posts from the past year as part of your study work.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;caret-color: rgba(255, 255, 255, 0.847); font-family: Calibri, sans-serif; font-size: 12pt; margin: 0cm 0cm 0cm 36pt; text-indent: -18pt; text-size-adjust: auto;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 7pt; font-stretch: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;AWS Security Specialty is the one I see closest to being &quot;hard&quot;. There&#39;s really a lot of stuff to cover, in a relatively deep level of detail: Networking, Crypto, IAM, logging, policies syntax and small idiosyncrasies. I can see how it really tries to assess real experience on AWS security.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;Am I done with the certs now? Maybe, not sure. It may become an expensive hobby :-). Well...those Azure security certs do not look that hard, I still have that 50% off voucher for AWS exams and I really need to spend some time learning about Google cloud ;-)&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;P.S. As I’m doing this during the COVID-19 pandemic, I took these tests in the “online proctored” mode. THEY SUCK! I was expecting those VUE, PSI guys would have learned by now how to do it right. No, they tech and processes are horrible. I had problems during the 3 exams, one with PSI (AWS Practitioner), the worst one, and two with VUE. If you are a person that gets anxious or nervous during the exam, this is definitely not for you. Some of the issues I had to go through would take many candidates out of their minds and strongly impair their ability to answer the questions.&lt;/p&gt;</description><link>http://blog.securitybalance.com/2021/05/professional-certifications-reboot.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEH7C6eNqkk0HpXvYEOLDyEHQXSp2wDiIAiNrD06bfUPsAJqV4p8iXqbU_vseRaZ9SyX4zCRWVaTSMs4-SG7QkWxKZ4iacZQR5W9JFKHClBM1RAVme7IRqxNNRNMYXezN4kKkBW1aVUp8/s72-w603-h98-c/image.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-2604435846056361824</guid><pubDate>Fri, 16 Apr 2021 20:49:00 +0000</pubDate><atom:updated>2021-04-16T16:55:40.311-04:00</atom:updated><title>The Bright Future of Cloud SIEM</title><description>&lt;p&gt;&lt;/p&gt;TL;DR: People keep questioning SIEM value, but cloud SIEM makes SIEM so much better. SIEM is now capable of delivering a lot of security value with far less effort from security teams.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The SIEM market is a US$5B market with a two-digit annual growth rate. Still, we keep seeing multiple questions and discussions around SIEM’s role, future and value. Why?&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;There are many reasons, including:&lt;br /&gt; &lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;The high importance of SIEM’s role for security operations:&lt;/u&gt;&lt;/b&gt; The SIEM is often the foundation of Security Operation Centers and has a critical role in their work. It is natural to see it being constantly evaluated and discussed as it has a role in almost all SOC processes.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Cost and budget share:&lt;/u&gt;&lt;/b&gt; SIEM is not cheap. It usually takes a big chunk of the security budget. Organizations will keep trying to reduce it as part of their cost optimization efforts, while vendors of other technologies will keep trying to sell their products as alternatives to tap into existing SIEM budgets.  &lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Operational effort required:&lt;/u&gt;&lt;/b&gt; SIEM is definitely not a “set and forget” tool. This is not a deficiency per se, as other technologies, such as EDR, also require people to deliver value. But the concerns about how much effort must be put into SIEM operations is a constant driver of discussions about improvements or even replacements of this technology.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Multitude of experiences&lt;/u&gt;&lt;/b&gt;: SIEM has been around for more than 20 years. Many professionals have gone through multiple implementations, sometimes with good experiences, sometimes not so much. I’ve seen many people with very strong opinions on SIEM based on their personal experiences with this type of tool, experiences that many times are not representative of how SIEMs can support security initiatives.&lt;/li&gt;&lt;li&gt;&lt;b&gt;&lt;u&gt;Evolution of other technologies and of the entire technology landscape:&lt;/u&gt;&lt;/b&gt; As other technologies evolve, it is inevitable to look at how they impact the role of SIEM. It happened with UEBA, it happened with SOAR, it is happening with XDR. The technology environments where these tools operate are also constantly evolving. Big SAN storage systems came up, virtualization became ubiquitous, big data spread out like wildfire. These changes affect the security tools we use to protect IT environments in multiple ways. Some increased the amount of data to be collected and processed, while others were used to evolve SIEM and make it more scalable and capable.  &lt;/li&gt;&lt;/ul&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;Nothing is more important to those discussions as Cloud SIEM. Not just “hosted” in the cloud, but as a native cloud offering. Why? Because now SIEM vendors can have some control over deployment success. What are you saying, Augusto? Didn’t they have control over the success of their own product before? Yes, that’s true!&lt;br /&gt;&lt;br /&gt;As a traditional SIEM vendor, it is very hard for you to ensure the customer will be able to get all the benefits your product can provide. First, they may underestimate the required capacity for their environment. They will end with a sluggish product, overflowing with data, having to deal with adding servers, memory, storage, or even stopping the deployment to rearchitect the whole solution before getting any value from it. I’ve seen countless SIEM deployments dying this way before generating any return of investment. &lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;But it doesn’t stop there. They may get the sizing right but underestimate the effort to keep it running. They estimate the number of people to use the SIEM, but they forget that a traditional SIEM requires people to &lt;b&gt;&lt;i&gt;use it&lt;/i&gt;&lt;/b&gt; but also to &lt;b&gt;&lt;i&gt;keep it running&lt;/i&gt;&lt;/b&gt;. That means people will spend their time keeping servers running, applying patches (to operating systems, middleware and to the SIEM software too), troubleshooting log collection, ensuring storage doesn’t blow up, and not paying attention to what the SIEM should actually be doing for them. The tool is up and running, but again, not providing any value.&lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;br /&gt;&lt;/p&gt;We can see how much the vendor depends on the customer to provide value. And even if the customers do things properly, there are other challenges too. Traditional software allows for high variation of deployments: Customers running on different versions, with different hardware and architecture. How can a vendor distribute SIEM content (parsers, rules, machine learning models, etc) that works in a consistent manner to its customers in this scenario? It just can’t.  &lt;br /&gt;&lt;br /&gt;Considering these factors, I risk saying that offering a traditional SIEM solution is like the Sisyphus Myth. As much as the vendor tries to deliver value, the solution will eventually fail to achieve the customer objectives. As traditional software, SIEM was really destined to die.&lt;div&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;How does the cloud SIEM change this?  &lt;/h3&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;caret-color: rgb(0, 0, 0); font-family: Calibri, sans-serif; margin: 0cm; text-size-adjust: auto;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;First, many challenges on SIEM deployments are related to problems that are completely solved or minimized by the SaaS model. Cloud services are highly scalable and elastic, and SaaS practically eliminates the need to maintain the application and underlying components. Now you have a SIEM that finally scales and does not require an army to keep it running. You can focus on using it appropriately. &lt;br /&gt;&lt;br /&gt;Second, a SaaS SIEM puts customers on highly standardized deployments. With most customers running on the same version, without capacity challenges, it’s far easier to deliver content that works for all of them. That makes a huge difference in perceived value. And it doesn’t stop there. With this scenario it becomes easier to the vendor to finally realize the benefits of the “wisdom of the crowds”. Developing more complex ML models for threat detection, for example, becomes easier and more effective. The vendor now has access to more data to train and tune the models. Even simple IOC match detection content can be quickly developed and delivered to all customers, allowing the SIEM vendor to provide detection of new, in the wild threats. &lt;br /&gt;&lt;br /&gt;Finally, delivering any software solution via SaaS gives the developer the opportunity to embrace more agile development practices. Upgrading a traditional SIEM deployment is so complex that vendors would naturally rely on traditional waterfall development practices, generating big releases with long times between them. SaaS SIEM can leverage agile development and CI/CD practices, so new features can be quickly added, and defects quickly fixed.  &lt;br /&gt;&lt;br /&gt;Cloud SIEM is on its infancy when you consider SIEM is just past its teenage years. But there are so many opportunities to explore with this model that I believe now we can say “Next-Gen SIEM” without feeling silly about it. Be careful with “SIEM is dead” claims. That sounds to me much like &quot;I think there is a world market for maybe five computers&quot;, by Thomas Watson in 1943.&lt;/div&gt;</description><link>http://blog.securitybalance.com/2021/04/the-bright-value-of-cloud-siem.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-963781993950448279</guid><pubDate>Fri, 19 Mar 2021 21:07:00 +0000</pubDate><atom:updated>2021-03-19T17:07:50.173-04:00</atom:updated><title>Some additional words on those SOC robots</title><description>&lt;p&gt;&amp;nbsp;The topic on SOC automation is really a fun one to think about, and even &lt;a href=&quot;http://blog.securitybalance.com/2021/03/the-robots-are-coming.html&quot;&gt;after putting my thoughts into words with my last post&lt;/a&gt;, I&#39;ve still kept thinking about it. Some additional considerations came to my mind.&lt;/p&gt;&lt;p&gt;The simplistic question of &quot;Will machines replace humans in a SOC&quot; can be clearly answered with a NO, as I explained in my previous post. As the human attackers are required to evolve the attacking robots, blue team people are required to update the automated defenses.&lt;/p&gt;&lt;p&gt;But things change if the question is asked with some additional nuance. If you ask &quot;will defense actions be automated end to end, from detection to response actions?&quot;, it becomes a more interesting question to answer.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ZwzhRhBCk9Zpa5ftCOo-DsH2fslNqRqXKehK9EzTmkYD9KBHU21h1nPnrTVrJvCA7shyphenhyphenINEoA0ix3UpOKTztny8Rz1KeOd8uS0vSvFwbMLA9NeqQNJcl0cNolw6ExWQ3RVBxzb0wAW8/&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;500&quot; data-original-width=&quot;960&quot; height=&quot;167&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ZwzhRhBCk9Zpa5ftCOo-DsH2fslNqRqXKehK9EzTmkYD9KBHU21h1nPnrTVrJvCA7shyphenhyphenINEoA0ix3UpOKTztny8Rz1KeOd8uS0vSvFwbMLA9NeqQNJcl0cNolw6ExWQ3RVBxzb0wAW8/&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The scenario of automated threats that &lt;a href=&quot;https://medium.com/anton-on-security/stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait-e19c5887ef2f&quot;&gt;Anton described in his post &lt;/a&gt;will, IMO, require SOCs to put together some end to end automation. Having a human involved for every response will not scale to face those attacks. Humans will be responsible for creating those playbooks and monitor their performance, but they cannot be involved in their execution. We need SOC automation that allows us to detect, investigate and initiate response without human intervention. This is challenging, but we must get there at some point.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.linkedin.com/feed/update/urn:li:activity:6777725710153977856?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A6777725710153977856%2C6777748245503451136%29&quot;&gt;Andre Gironda commented on the LinkedIn post&lt;/a&gt; pointing to my blog post that even with the appropriate tools he still can&#39;t fully automate simple phishing response. I could say he&#39;s probably being too perfectionist or doing something wrong, but I actually believe him. I believe automation can provide value by reducing human effort in the SOC right now, but full automation, even for some specific threats, is still challenging. But we&#39;ll have to get there if we want to stand a chance.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>http://blog.securitybalance.com/2021/03/some-additional-words-on-those-soc.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9ZwzhRhBCk9Zpa5ftCOo-DsH2fslNqRqXKehK9EzTmkYD9KBHU21h1nPnrTVrJvCA7shyphenhyphenINEoA0ix3UpOKTztny8Rz1KeOd8uS0vSvFwbMLA9NeqQNJcl0cNolw6ExWQ3RVBxzb0wAW8/s72-c" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-2413111772012673905</guid><pubDate>Tue, 16 Mar 2021 21:42:00 +0000</pubDate><atom:updated>2021-03-16T17:55:02.328-04:00</atom:updated><title>The Robots Are Coming!</title><description>&lt;p&gt;&amp;nbsp;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;The debate around SOC automation has been a fun one to follow.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://go.forrester.com/blogs/stop-trying-to-take-humans-out-of-security-operations/&quot; style=&quot;font-size: 18px;&quot;&gt;&lt;span class=&quot;s6&quot; style=&quot;color: blue; font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Allie&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s6&quot; style=&quot;color: blue; font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Mellen&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s6&quot; style=&quot;color: blue; font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;wrote a short but on the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s6&quot; style=&quot;color: blue; font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;spot&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s6&quot; style=&quot;color: blue; font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;piece about it&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;, reaffirming what&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;seems to be the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;commonsense&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;opinion on this topic today: Automation is good, but to augment human capacity, not replace it.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;After that&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://medium.com/anton-on-security/stop-trying-to-take-humans-out-of-soc-except-wait-wait-wait-e19c5887ef2f&quot;&gt;&lt;span class=&quot;s6&quot; style=&quot;color: blue; font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Anton brought up a very interesting follow up&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;, confirming that view but also pointing to a scary future scenario, where automation would be adopted so extensively by the attackers that it would force&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;defense&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;to do the same. Does this scenario make sense?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;I believe it does, and indeed it forces defense to adopt more automation&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;B&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;ut even if Anton says the middle&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;ground&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;position is &quot;cheating&quot;, I still think it is the most reasonable one. There will never be (until we reach the Singularity) a fully automated SOC, just as there will never be a fully automated attacker (until...you know). Why? Let&#39;s look at the scenario Anton painted for this evolved attacker:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;s10&quot; style=&quot;font-size: 18px; margin-bottom: 0px; margin-left: 36px; margin-top: 0px; text-indent: -18px;&quot;&gt;&lt;span class=&quot;s7&quot; style=&quot;font-family: Symbol; line-height: 21.600000381469727px;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;You face the attacker in possession of a machine that can auto-generate reliable&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;zero day&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;exploits and then use them (an upgraded version of what was the subject of&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/2016_Cyber_Grand_Challenge&quot;&gt;&lt;span class=&quot;s9&quot; style=&quot;color: blue; font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;2016 DARPA Grand Challenge&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;s10&quot; style=&quot;font-size: 18px; margin-bottom: 0px; margin-left: 36px; margin-top: 0px; text-indent: -18px;&quot;&gt;&lt;span class=&quot;s7&quot; style=&quot;font-family: Symbol; line-height: 21.600000381469727px;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;You face the attackers who use&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://seclists.org/dailydave/2021/q1/6&quot;&gt;&lt;span class=&quot;s9&quot; style=&quot;color: blue; font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;worms for everything&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;, and these are not the dumb 2003 worms, but these are coded by the best of the best of the offensive “community”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;s10&quot; style=&quot;font-size: 18px; margin-bottom: 0px; margin-left: 36px; margin-top: 0px; text-indent: -18px;&quot;&gt;&lt;span class=&quot;s7&quot; style=&quot;font-family: Symbol; line-height: 21.600000381469727px;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Your threat assessment indicates that “your” attackers are&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://lists.immunityinc.com/pipermail/dailydave/2020-March/001593.html&quot;&gt;&lt;span class=&quot;s9&quot; style=&quot;color: blue; font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;adopting automation faster than you are&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;s8&quot; style=&quot;font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;and the delta is increasing (and the speed of increase is growing).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s11&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Even if it looks scary, this scenario is still limited in certain points. You may have malware capable of creating exploits by itself, but what will they exploit? What is th&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;is&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;exploitation trying to accomplish&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;There is&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;an&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;abstract&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;level of&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;actions&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;that is defined by the creator of the malware.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Using&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;MITRE ATT&amp;amp;CK language, the malware is capable of generating multiple&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s12&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; font-weight: bold; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;instances&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;of a selection of techniques, but&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s12&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; font-weight: bold; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;a human must define the tactics and select the techniques&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;to be used. Quoting Rumsfeld, there will be more known unknowns, but&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s12&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; font-weight: bold; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;the unknown unknown is still the realm of humans&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;A few years&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;ago,&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;I had a similar discussion with a vendor claiming that their deep learning&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;-&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;based technology would be able to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;detect&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&quot;any malware&quot;. This is nonsense. Even the most advanced ML&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;still needs to be&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;pointed to some data to look at. If the signal required to detect something is not in that data, there&#39;s no miracle. Let&#39;s look at a simple example:&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;s14&quot; style=&quot;font-size: 18px; margin-bottom: 0px; margin-left: 63px; margin-top: 0px; text-indent: -18px;&quot;&gt;&lt;span class=&quot;s13&quot; style=&quot;font-family: Symbol; font-size: 10px; line-height: 12px;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;A super&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;network-based&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;detection technology inspects ALL network traffic and can miraculously identify any attack.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;s14&quot; style=&quot;font-size: 18px; margin-bottom: 0px; margin-left: 63px; margin-top: 0px; text-indent: -18px;&quot;&gt;&lt;span class=&quot;s13&quot; style=&quot;font-family: Symbol; font-size: 10px; line-height: 12px;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;The attacker is on host A in this network, planning to attack host B, connected to the same network&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;s14&quot; style=&quot;font-size: 18px; margin-bottom: 0px; margin-left: 63px; margin-top: 0px; text-indent: -18px;&quot;&gt;&lt;span class=&quot;s13&quot; style=&quot;font-family: Symbol; font-size: 10px; line-height: 12px;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;The attacker scans for&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Bluetooth&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;devices from host A, finds host B, exploits host B via a&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Bluetooth&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;exploit&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;s14&quot; style=&quot;font-size: 18px; margin-bottom: 0px; margin-left: 63px; margin-top: 0px; text-indent: -18px;&quot;&gt;&lt;span class=&quot;s13&quot; style=&quot;font-family: Symbol; font-size: 10px; line-height: 12px;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;The super NDR/NIDS tool sits there patiently waiting to see&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s12&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; font-weight: bold; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;an&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s12&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; font-weight: bold; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;attack that never traverses the monitored network&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;You may claim this is&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;an&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;edge scenario, but I&#39;m using&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;an&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;exaggerated situation on purpose&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;There’s still many cases that we can relate to, such as&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;breaches due to the use of shadow IT&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;, cloud resources, etc. What I want to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;highlight&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;is&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;type of&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;lateral thinking very often employed by attackers in cybersecurity. And&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s12&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; font-weight: bold; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;the lateral thinking is still exclusive of humans&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;What I&#39;m trying to say is that fully automated threats are scary, buy the&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;y&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;lack the main force that makes detecting threats challenging. Defense automation can evolve to match the same level, but both sides will still rely on humans to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;tip the scale&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;when those machines reach a balance point in capabilities.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;What we have today is similar to those battling&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;robots&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;TV shows. Machines operated by humans. If things evolve as Anton suggests we will move to what happens in &quot;robot soccer&quot;: human created machines operating autonomously, but within a finite framework of capabilities.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdqmsC9vJZkpFxT6biHL92tpmho3IjJylaYVbmUQw4eP8oiPRXRggMB75yfyOQqhfSJVxHPWCcuaVxUBLYn_SJ2W0wOcNhqJz_Q8AnjecsHOnJ9oWosv6ZyjtjuEt4rMNaqAo4wFDuMCI/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;360&quot; data-original-width=&quot;640&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdqmsC9vJZkpFxT6biHL92tpmho3IjJylaYVbmUQw4eP8oiPRXRggMB75yfyOQqhfSJVxHPWCcuaVxUBLYn_SJ2W0wOcNhqJz_Q8AnjecsHOnJ9oWosv6ZyjtjuEt4rMNaqAo4wFDuMCI/&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdqmsC9vJZkpFxT6biHL92tpmho3IjJylaYVbmUQw4eP8oiPRXRggMB75yfyOQqhfSJVxHPWCcuaVxUBLYn_SJ2W0wOcNhqJz_Q8AnjecsHOnJ9oWosv6ZyjtjuEt4rMNaqAo4wFDuMCI/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9M0qMlbRMX5sSmL1A_Zv3Pk8hNa32WXU4KHLuM5JqCAo-W2DHmXA6Ta1S_uThlheJNxK9svbwM9rg6pjp6ajhrqCq2MbVRRrfdOOuFxmGm1PQnBOp-T4V9T9aOM6ncj6vSPyZTXt83VY/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;395&quot; data-original-width=&quot;702&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9M0qMlbRMX5sSmL1A_Zv3Pk8hNa32WXU4KHLuM5JqCAo-W2DHmXA6Ta1S_uThlheJNxK9svbwM9rg6pjp6ajhrqCq2MbVRRrfdOOuFxmGm1PQnBOp-T4V9T9aOM6ncj6vSPyZTXt83VY/&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;color: #5a5a5a; font-size: 1.5em; font-style: italic;&quot;&gt;Robot wars vs Robot Soccer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;line-height: 21.600000381469727px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;line-height: 21.600000381469727px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Threats and SOCs will become more automated for sure. As they automate, they become faster, so each side has to increase its own level of automation to keep up. But when automation limits are reached, the humans on the threat side must apply that lateral thinking to find other avenues to exploit. They need to take the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Kobayashi_Maru&quot;&gt;&lt;span class=&quot;s6&quot; style=&quot;color: blue; font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Kirk approach to Kobayashi Maru&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;. When this happens, the humans on the defense side become critical. They need to figure out what is happening and create new ways to fight against the new methods.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhslAliwejLlziVnzvBRHn0Ap0bJOeN1pqR9XWwnOXg1xkC7tQH1iUYA4EiDRyCcmb4zGYpeByo9KLi8_knF7r8TH3OOHqOfm8Mcx85COqkse3X7XFJUmt3BvzrebNMdmE6Sy1UbnEZYYY/&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;340&quot; data-original-width=&quot;720&quot; height=&quot;151&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhslAliwejLlziVnzvBRHn0Ap0bJOeN1pqR9XWwnOXg1xkC7tQH1iUYA4EiDRyCcmb4zGYpeByo9KLi8_knF7r8TH3OOHqOfm8Mcx85COqkse3X7XFJUmt3BvzrebNMdmE6Sy1UbnEZYYY/&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;line-height: 21.600000381469727px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;s4&quot; style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-left: 27px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;line-height: 21.600000381469727px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;So,&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;humans will still be necessary on both sides.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;Of course,&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;the operational involvement will be greatly reduced, again, on both sides. But they will be there, waiting&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;to react&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;against the innovation introduced by their counterparts on the other side.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;This may be&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;an&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;anti&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;climactic&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;conclusion, and it is. But there are some interesting follow up conversations to have. The number of humans required, their skills and how they are engaged will be different. What does it mean for outsourcing? Do end users still need people on their side? If solution providers engage this problem in a smart&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;way,&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;we may be able to remove, or greatly reduce&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;,&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;the need for humans on the end user organization side, for example. The remaining humans would be on the vendor side, adapting the tools to react against the latest attacks. For the end user organization, the result may look very similar to full automation, as they would not need to add&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s12&quot; style=&quot;font-family: Calibri; font-size: 11px; font-style: italic; font-weight: bold; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;their&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;humans to the mix. Will we end up with the&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;m&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;y&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;thical&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;s5&quot; style=&quot;font-family: Calibri; font-size: 11px; line-height: 13.199999809265137px;&quot;&gt;&lt;span class=&quot;bumpedFont15&quot; style=&quot;font-size: 1.5em; line-height: 19.799999237060547px;&quot;&gt;&amp;nbsp;&quot;SOC in a box&quot;? Future will tell.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;font-size: 18px; line-height: 21.600000381469727px; margin-bottom: 0px; margin-top: 0px;&quot;&gt;&lt;span style=&quot;line-height: 21.600000381469727px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description><link>http://blog.securitybalance.com/2021/03/the-robots-are-coming.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdqmsC9vJZkpFxT6biHL92tpmho3IjJylaYVbmUQw4eP8oiPRXRggMB75yfyOQqhfSJVxHPWCcuaVxUBLYn_SJ2W0wOcNhqJz_Q8AnjecsHOnJ9oWosv6ZyjtjuEt4rMNaqAo4wFDuMCI/s72-c" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-1100552062649894318</guid><pubDate>Thu, 04 Mar 2021 17:35:00 +0000</pubDate><atom:updated>2021-03-04T12:35:55.203-05:00</atom:updated><title>An Analysis of Past Mistakes</title><description>&lt;p&gt;&amp;nbsp;&lt;span style=&quot;text-align: center;&quot;&gt;As I was looking for an old email in my archives, I stumbled on discussions about a security incident that happened almost 13 years ago. That was that time when, well, there&#39;s no other way of saying it....I was hacked.&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;The good thing about looking at incidents like that one after a long time is that it helps us understand what really happened and also run a less passionate and unbiased assessment of our own actions. I have to say this case is really enlightening, in many ways. There are good lessons to learn and mistakes to acknowledge from multiple perspectives: Technical, Managerial and even Political.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;The year was 2008. I was part of the Board for the Brazil ISSA chapter. We were trying to push for a more inclusive posture of the association, promoting free monthly encounters and other initiatives. Our group took over the board when we felt there were too many security vendors dominating the association, many of them pulling things to where their business would benefit most. A group of friends and acquaintances discussed this and after some deliberation, I was chosen as the head of the ballot. It was an honor for me at that time, as each one in that group was capable of taking the central role. We won the election using our network and a popular email discussion board at that time to spread our word and our plans for the association.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;So, back to the &quot;breach&quot;. We had set up a portal for the association using an open source CMS, Joomla. Joomla was plagued by vulnerabilities at that time, and someone managed to access the user database and crack the passwords. The password for my test account there...well, I was using it in some other places. It was my old password from before I started working with security. I had replaced it almost everywhere, but it was still used on a few places I had forgot about, like LinkedIn and a hotmail account I used to have so I could use MS Messenger. Well, those, and a couple of other services were quickly found by the attackers, and an embarrassing message with all that was posted in that popular email forum, and other places. In summary, an application breach on a website ran by...security professionals, and some pretty lame secops practices by one those guys exposed.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;What have I been able to extract from that incident? A lot. Here it is.&amp;nbsp;&lt;/div&gt;&lt;h3 style=&quot;clear: both; text-align: left;&quot;&gt;Technical lessons&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;The easiest to mention. We were using a horrible tool from a security perspective (Joomla). We had been warned by some people, but some of our group believed we could run it securely by not using crappy plugins and keeping it always up to date. But we didn&#39;t have a dedicated security operations team to keep watching it. In addition to it, we knew there were technically competent people out there trying to hack us. So, the threat component was high. It was an explosive combination. In short, we should have made choices that would simplify the challenge of keeping the vulnerability profile low, as we didn&#39;t have time to protect it like it should be.&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Then, there was my own personal mistake, reusing a password. It is certainly something no one, especially a security professional, should do.&amp;nbsp; Of course, I was already aware of that, and I was already using unique, different passwords on almost everything that mattered at that time. But this old password (&quot;trustno1&quot;, if you really wanna know!) was something I started using long before getting involved with security. As I became more aware of the risks of password reuse I started changing it everywhere, but there were still a few places I had forgotten to do it. To make things worse, I started using it as my &quot;throwaway&quot; password for testing needs. An account I had for testing on the ISSA chapter website was using that password. Bad secops…bang, they got me.&amp;nbsp;&lt;/div&gt;&lt;h3 style=&quot;clear: both; text-align: left;&quot;&gt;Management Lessons&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;This is where I think we can start getting good lessons from the incident. This is about our organizations, the ISSA chapter. How come a security professionals organization be hacked?&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;We fell for the same mistakes we see in many other organizations. First, the fact that we were all security people caused the &quot;too many cooks in the kitchen&quot; issue. Who was the &quot;CISO&quot; for our organization? That was never defined, so there weren&#39;t clear roles and responsibilities defined regarding our own security. I brought the site up and did some of the initial hardening, but at that time I was already moving those responsibilities to other people and completely focused on other issues (I was preparing to move to Canada at that time). People generally know about vulnerability management, but on that case, I believe no one was actually the owner of that process and consciously doing it for us.&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;h3 style=&quot;clear: both; text-align: left;&quot;&gt;Political, social and relationship lessons&lt;/h3&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Here&#39;s another point from where I extract a lot of personal lessons. When we took over the chapter, our group had as one of its objectives to close the gap between the &quot;security professionals&quot; community (the CISSPs :-)), in fact those dealing with risk management, security policies and other less technology oriented topics, and those with the technology background or IT security jobs. That should also include the &quot;hacking&quot; community (or &quot;scene&quot;).&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;That divide between the &quot;management people&quot; and the &quot;technical people&quot; was also related to professionals in different stages in their careers. It was very hard to find technical individual contributors in a highly paid position in Brazil at that time. It wasn&#39;t interesting to make them part of ISSA for some of the previous directors because there was low value in junior people as potential customers to their products and services. Trying to be more inclusive of professionals with technical backgrounds was really the attempt to make the association useful for people in the early stages of their careers as well.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;But although I have a technical background, I was never close the underground scene in Brazil. I knew people who were, some volunteers helping us during those days were very connected to that community. Still, I&#39;ve never been a fan of some of the more juvenile aspects of hacking communities. The use of leetspeak, piercings, crazy haircuts...nothing against that, it&#39;s just not my thing.&amp;nbsp; This, on top of my effort to make the technical professionals voices heard in the community, made me adopt a gatekeeping position, as in my view they were not being helpful in solving the problem I wanted to solve. In more traditional environments, appearances matter a lot. At that time, it was hard to be taken seriously wearing shorts, a mohawk and writing “3 n0iZ M4n0!!”.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;In the end, I believe we didn&#39;t do enough to reach out and include them, and they felt excluded. Our posture about a &quot;professional organization&quot;, plus a growing number of charlatans in the market put fire in a &quot;take down a whitehat&quot; movement, which I ultimately fell victim of.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;I had helped create the animosity against security professionals, then underestimated their abilities and their motivations against me. What a stupid combination, right? Yes, I know. Talk about not having control over the &quot;Threat&quot; component of the risk equation...&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;In summary, that was my collection of mistakes. Technical blunders, classical management mistakes and a dose of simple immaturity. For those also hurt in the process, I&#39;m sorry. I hope I can keep learning from mistakes like those and make better decisions in the future. This is an extremely important part of working in security, knowing we&#39;ll never be able to reach perfection.&amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://blog.securitybalance.com/2021/03/an-analysis-of-past-mistakes.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-2743363135274107124</guid><pubDate>Fri, 09 Oct 2020 15:27:00 +0000</pubDate><atom:updated>2020-10-09T11:27:00.570-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">siem</category><category domain="http://www.blogger.com/atom/ns#">threat detection</category><category domain="http://www.blogger.com/atom/ns#">vulnerability management</category><title>Monitoring and Vulnerability Management</title><description>&lt;p&gt;&lt;i&gt;&lt;b&gt;&amp;nbsp;(Cross posted from &lt;a href=&quot;https://www.securonix.com/zerologon-and-the-role-of-monitoring-in-vulnerability-management/&quot;&gt;the Securonix Blog&lt;/a&gt;)&lt;/b&gt;&lt;/i&gt;&lt;/p&gt;Vulnerability management is one of the most basic security hygiene practices organizations must have in place to avoid being hacked. However, even being a primary security control doesn&#39;t make it simple to successfully implement. I used to &lt;a href=&quot;https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/&quot;&gt;cover VM in my Gartner days&lt;/a&gt;, and it was sad to see how many organizations were not doing it properly.&lt;br /&gt;&lt;br /&gt;Many security professionals see VM as a boring topic, usually seeing it simply as a &quot;scan and patch&quot; cycle. Although the bulk of a typical VM program may indeed be based on the processes of scanning for vulnerabilities and applying patches, there are many other things that need to be done so it can deliver the expected results.&lt;br /&gt;&lt;br /&gt;One of the most important pieces of it is the prioritization of findings. It is clear to most organizations that patching every open vulnerability is just not feasible. If you can&#39;t patch everything, what should you patch first? There are many interesting advancements in this area. What used to be based only on the severity of the vulnerabilities (the old CVSS value) is now a more sophisticated process that leverages multiple data points, including threat intelligence. The &lt;a href=&quot;https://www.kennaresearch.com/tools/epss-calculator/&quot;&gt;EPSS research by Kenna Security&lt;/a&gt; is a great example of how evolved the practice of prioritizing vulnerabilities is now when compared to the old CVSS times.&lt;br /&gt;&lt;br /&gt;But even when you are able to decide what to patch first, there are also cases where the remediation is not simply applying a patch. Some vulnerabilities involve not only a bug, but also other issues such as the existence of legacy software and protocols in the environment. These situations usually require a more complex approach, and that&#39;s where an additional component of the VM process, the compensating controls, become important.&lt;br /&gt;&lt;br /&gt;Compensating controls are used to address the risk of a vulnerability while the full remediation cannot be applied. Using an IPS, for example, is a typical compensating control. You can use them when you cannot apply the remediation, such as when a patch is not available, or to mitigate the risk until you are comfortable enough (usually after testing is done, during a maintenance window) to apply it. We usually see some security controls that can avoid or reduce the impact of vulnerability exploitation as the ideal candidates for compensating risk, but there is something I always like to bring up during this discussion: Monitoring.&lt;br /&gt;&lt;br /&gt;Think about it for a second. You have an open vulnerability that you still cannot patch. The exploit is available, as well as a lot of information about how it is used. Even if you cannot avoid it, you can use all this information to build a security monitoring use case focused on the exploitation of this specific vulnerability. You it is there, and that there is a chance for it being exploited, so why not put something together to look for that exploitation? You can prioritize the alerts generated by this use case, as you know you are currently vulnerable to that type of attack.&lt;br /&gt;&lt;br /&gt;A great example of using security monitoring as part of the VM process is what is happening with the new Windows Zerologon EP (ZEP) vulnerability (&lt;a href=&quot;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472&quot;&gt;CVE-2020-1472&lt;/a&gt;). The issue is complex and requires more than just applying a patch. &lt;a href=&quot;https://www.securonix.com/from-zero-to-dc-new-zerologon-attack-variants-cve-2020-1472-exploitation-and-detection-distilled/&quot;&gt;Our VP of Threat Research, Oleg Kolesnikov, produced a great write-up about the details and also variants of exploitation and detection&lt;/a&gt;. In summary, Microsoft has provided a patch for the immediate problem, but some third-party systems may still use an older, vulnerable version of Netlogon secure channel connections. To avoid breaking functionality of existing systems, Microsoft has introduced new events in their logs to identify the use of these older versions, and &lt;a href=&quot;https://support.microsoft.com/en-us/help/4557222/how-to-manage-the-changes-in-netlogon-secure-channel-connections-assoc&quot;&gt;signaled they will move to an enforcement mode&lt;/a&gt; that will not accept them anymore after February, 2021.&lt;br /&gt;&lt;br /&gt;This is where aligning monitoring with the remediation process becomes so important. The new events added by Microsoft can help identify attack attempts and track other vulnerable systems on the network.  A pre-established process to coordinate the use of monitoring tools and infrastructure as an additional compensating control for VM can help in situations like this, where the plan to handle a vulnerability also requires monitoring activities.</description><link>http://blog.securitybalance.com/2020/10/monitoring-and-vulnerability-management.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-7633779645597461819</guid><pubDate>Mon, 21 Sep 2020 19:55:00 +0000</pubDate><atom:updated>2020-09-21T15:55:42.421-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">siem</category><category domain="http://www.blogger.com/atom/ns#">threat detection</category><title>DDLC - Detection Development Life Cycle</title><description>Dr. Chuvakin has recently delivered &lt;a href=&quot;https://medium.com/anton-on-security/can-we-have-detection-as-code-96f869cfdc79&quot;&gt;another great blog post&lt;/a&gt; about &quot;detection as code&quot;. I was glad to read it because it was the typical discussion we used have in our brainstorming conversations at Gartner. It had a nice nostalgic feeling :-). But it also reminded me of my favorite paper from those times, &lt;a href=&quot;http://blog.securitybalance.com/2020/04/from-my-gartner-blog-developing-and.html&quot;&gt;&quot;How To Develop and Maintain Security Monitoring Use Cases&quot;.&lt;/a&gt;&lt;div&gt;&lt;br /&gt;&lt;div&gt;That paper describes a process framework for organizations to identify and develop use cases for security monitoring. It was intentionally designed to be tool neutral, so it could be used to develop SIEM rules, IDS signatures or any other type of content used by security monitoring tools. It was also built to mimic Agile development processes, to avoid the capital mistake of killing the required agility to adapt to threats by too much process. I had fun discussions with great minds like &lt;a href=&quot;https://www.infoseczanshin.com/&quot;&gt;Alex Sieira&lt;/a&gt; and &lt;a href=&quot;https://opstune.com/&quot;&gt;Alex Teixeira&lt;/a&gt; (what&#39;s this with Alexes and security?) when developing some of the ideas for that paper.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Reading the philosophical musings from Anton on &quot;detection as code&quot; (DaaC?), I realized that most of threat detection is code already. All the &quot;content&quot; covered by our process framework is developed and maintained as code, so I believe we are quite close, from a technology perspective, to DaaC. What I think we really need is a &lt;b&gt;&lt;i&gt;DDLC - Detection Development Life Cycle&lt;/i&gt;&lt;/b&gt;. In retrospect I believe our paper would be more popular if we used that as a catchy title. Here&#39;s a free tip for the great analysts responsible for future updates ;-)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Anyway, I believe there are a few things missing to get to real DaaC and DDLC. Among them:&lt;/div&gt;&lt;div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Testing and QA&lt;/b&gt;. We suck at effectively testing detection content. Most detection tools have no capabilities to help with it. Meanwhile, the software development world has robust processes and tools to test what is developed. There are, however, some interesting steps in that direction for detection content. BAS tools are becoming more popular and integrated to detection tools, so the development of new content can be connected to testing scenarios performed by those tools. Just like automated test cases for apps, but for detection content. Proper staging of content from development to production must also be possible. Full UAT or QA environment are not very useful for threat detection, as it&#39;s very hard and expensive to replicate the telemetry flowing through production systems just for testing. But the production tools can have embedded testing environments for content. The Securonix platform, for example, has introduced the &lt;a href=&quot;https://www.securonix.com/securonix-analytics-sandbox-improving-soc-efficiency-and-making-siem-tuning-safer/&quot;&gt;&lt;b&gt;Analytics Sandbox&lt;/b&gt;&lt;/a&gt;, a great way to test content without messing with existing production alerts and queues.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Effective requirements gathering processes&lt;/b&gt;. Software development is plagued by developers envisioning capabilities and driving the addition of new features. It&#39;s a well-known problem in that realm and they have developed roles and practices to properly move the gathering of requirements to the real users of the software. Does it work for detection content? I&#39;m not sure. We see &quot;SIEM specialists&quot; writing rules, but are they writing rules that generate the alerts the SOC analysts are looking for? Or looking for the activities the red team has performed in their exercises? Security operations groups still operate with loosely defined roles and for many organizations the content developers are the same people looking at the alerts, so the problem may not be that evident for everyone. But as teams grow and roles become more distributed, it will become a big deal. This is also important when so much content is provided by the tools vendors or even content vendors. Some content does not need direct input from each individual organization; we do not have many opportunities to provide our requirements for OS developers, for example, but OS users requirements are generic enough to work that way. Detection content for commodity threats is similar. But when dealing with threats more specific to the business, the right people to provide the requirements must be identified and connected to the process. Doing this continuously and efficiently is challenging and very few organizations have consistent practices to do it.&lt;/li&gt;&lt;li&gt;Finally, &lt;b&gt;embedding the toolset and infrastructure into DDLC&lt;/b&gt; to make it really DaaC. Here&#39;s where my post is very aligned to what Anton initially raised. Content for each tool is already code, but the setup and placement of the tools themselves is not. There&#39;s still a substantial amount of manual work to define and deploy log collection, network probes and endpoint agents. And that setup is usually brittle, static and detached from content development. Imagine you need to deploy some network-based detection content and find out there&#39;s no traffic capture setup for that network; someone will have to go there and add a tap, or configure something to start capturing the data you need for your content to work. With more traditional IT environments the challenge is still considerable, but as we move to cloud, devops managed environments, these pre-requisite setting can also be incorporated as code in the DDLC.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;There&#39;s still a lot to make full DaaC and comprehensive DDLC a reality. But there&#39;s a lot of interesting stuff in this sense going on, pushed by the need for security operations to align with the DevOps environments in need to be monitored and protected. Check the &lt;a href=&quot;https://www.securonix.com/securonix-analytics-sandbox-improving-soc-efficiency-and-making-siem-tuning-safer/&quot;&gt;&lt;b&gt;Analytics Sandbox&lt;/b&gt; &lt;/a&gt;as a good example. We&#39;ll certainly see more like this coming up as we move closer to the vision of threat detection becoming more like software development.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://blog.securitybalance.com/2020/09/ddlc-detection-development-life-cycle.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-2009471898094687569</guid><pubDate>Fri, 11 Sep 2020 19:00:00 +0000</pubDate><atom:updated>2020-09-11T15:11:33.968-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">siem</category><title>NG SIEM?</title><description> An interesting result from changing jobs is seeing how people interpret your decision and how they view the company you’re moving to. I was happy to hear good feedback from many people regarding Securonix, reinforcing my pick for the winning car in the SIEM race.&lt;br /&gt;&lt;br /&gt;But there was a question that popped up a few times that indicates an interesting trend in the market: “A SIEM? Isn’t it old technology?”. No, it is not. It may be an old concept, but definitely not “old technology”.&lt;br /&gt; &lt;br /&gt;Look at these two pictures below? What do they show?&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia_HYwSyTlc1MyHSzml4g5ApxJrf1rHEBFyF8ZO763RONMnyBINpnGE1Ol09bfOpfVrZUg7WcT67tD6kvmNWv6N0hmbObL3_EVRK2paO1vxG1SoE3quXBANZ8Sv0P8KmLPJz1ldpI8hbs/s2038/cars-old-new.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;684&quot; data-original-width=&quot;2038&quot; height=&quot;215&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia_HYwSyTlc1MyHSzml4g5ApxJrf1rHEBFyF8ZO763RONMnyBINpnGE1Ol09bfOpfVrZUg7WcT67tD6kvmNWv6N0hmbObL3_EVRK2paO1vxG1SoE3quXBANZ8Sv0P8KmLPJz1ldpI8hbs/w640-h215/cars-old-new.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Both show &lt;b&gt;&lt;i&gt;cars&lt;/i&gt;&lt;/b&gt;. But can we say the Tesla is “old technology”? Notice that the basic idea behind both is essentially the same: Transportation.  But this, and the fact they have four wheels, is probably the only thing in common. This is the same for the many SIEMs we’ve seen in the market in twenty or so many years.&lt;br /&gt;&lt;br /&gt;Here is the barebones concept of a SIEM:&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH0KVUHSztLU2wSoXFqvSpW-85ABHqTT40I4XdcuKpPpOUIq1LXPVC-iJMSA-Y4J7-4OWwdHT20LjYKSiAg2sdE9yckxlUSXu7X35qZcMMydZqdvHqKfmIr8jA5javNFCbwis0jQIhgCA/s1612/basic-siem.png&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;542&quot; data-original-width=&quot;1612&quot; height=&quot;216&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhH0KVUHSztLU2wSoXFqvSpW-85ABHqTT40I4XdcuKpPpOUIq1LXPVC-iJMSA-Y4J7-4OWwdHT20LjYKSiAg2sdE9yckxlUSXu7X35qZcMMydZqdvHqKfmIr8jA5javNFCbwis0jQIhgCA/w640-h216/basic-siem.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;br /&gt;&lt;/p&gt;How this is accomplished, as well as the scale of things, have changed dramatically since ArcSight, Intellitactics and netforensics days. Some of the main changes:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Architecture&lt;/b&gt;. Old SIEMs were traditional software stacks running on relational databases and with big and complex fat clients for UI. Compare this with the modern, big data powered SaaS systems with sleek web interfaces. Wow!&lt;/li&gt;&lt;li&gt;&lt;b&gt;Use cases&lt;/b&gt;. What were we doing with the SIEMs in the past? Some reports, such as “top 10 failed connection attempts” or some other compliance driven report. Many SIEMs had been deployed as an answer to SOX, HIPAA and PCI DSS requirements. Now, most SIEMs are used for threat detection. Reporting, although still a thing, is far less important than the ability to find the needle in the haystack and provide an alert about it.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Volume&lt;/b&gt;. SIEM sizing used to be a few EPS, Gigabytes exercise. With the need to monitor chatty sources such as EDR, NDR and cloud applications the measures are orders of magnitude higher. This changes the game in terms of architecture (cloud is the new normal) and also drive the need for better analytics; we can’t handle the old false positive rates with the current base rates of events.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Threats&lt;/b&gt;. It was so easy to detect threats in the past. It was common to find single events that could be used to detect malicious actions. But attacks have evolved to a point where multiple events may be assessed, in isolation and together as a pattern, to determine the existence of malicious intent.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Analytics&lt;/b&gt;. Driven by the changes to threats, volume and use cases, the analytics capabilities of SIEM have also changed in a huge manner. While old SIEMs would give us some regex capabilities and simple AND/OR correlation, modern solutions will do that and far, far more. Enriched data is analyzed with modern statistics and ML algorithms, providing a way to identify the stealthiest threat actions.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;With all that in mind, does it still make sense to call these new &lt;i&gt;Teslas of threat detection&lt;/i&gt; a “SIEM”? Well, if we still call a Tesla a car, why not keep the SIEM name?&lt;p class=&quot;MsoNormal&quot; style=&quot;font-family: calibri, sans-serif; font-size: 12pt; margin: 0in;&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/p&gt;However, differentiating between the old rusty SQL-based tool and the advanced analytics SaaS tools of modern days is also important. In my previous life as an analyst I would frequently laugh at the “Next Gen” fads created by vendors trying to differentiate. But I also have to say it was useful to provide a distinction between the old Firewall and what we now call NGFW. People know the implied difference in capabilities when we say NGFW. With that in mind, I believe saying NG-SIEM is not really a bad thing, if you consider all those differences I mentioned before. Sorry Gartner, I did it! :-)&lt;br /&gt;&lt;br /&gt;So, old SIEM dead, long live the NG-SIEM? No, I don’t think we need to do that. But in conversations where you need to highlight the newer capabilities and more modern architecture, it’s certainly worth throwing the NG there.&lt;br /&gt;&lt;br /&gt;Tesla owners can’t stop talking about how exciting their cars are. For us, cybersecurity nerds, deploying and using a &lt;a href=&quot;https://www.blogger.com/#&quot;&gt;&lt;b&gt;Next-gen SIEM&lt;/b&gt;&lt;/a&gt; gives a similar thrill.</description><link>http://blog.securitybalance.com/2020/09/ng-siem.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia_HYwSyTlc1MyHSzml4g5ApxJrf1rHEBFyF8ZO763RONMnyBINpnGE1Ol09bfOpfVrZUg7WcT67tD6kvmNWv6N0hmbObL3_EVRK2paO1vxG1SoE3quXBANZ8Sv0P8KmLPJz1ldpI8hbs/s72-w640-h215-c/cars-old-new.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-8392148486837940955</guid><pubDate>Mon, 31 Aug 2020 19:44:00 +0000</pubDate><atom:updated>2020-08-31T15:44:36.770-04:00</atom:updated><title>I&#39;m Joining Securonix</title><description>&lt;p&gt;&amp;nbsp;&lt;span style=&quot;font-family: Arial; font-size: 11pt; white-space: pre-wrap;&quot;&gt;I’m very happy to announce today I’m starting my journey with Securonix!&lt;/span&gt;&lt;/p&gt;&lt;span id=&quot;docs-internal-guid-85db0f40-7fff-4b3c-6055-b17449f3e972&quot;&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I’ve spent the last five years working as an industry analyst, talking to thousands of clients and vendors about their challenges and solutions on security operations. During this time I was able to identify many of common pain points and what vendors have been doing to address them. Some with success, some not much.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Helping clients as an analyst is a great job. It gives you tremendous visibility into their challenges. But it is also somewhat limited into how much you can help them. So I ended up with many ideas and things I’d like to do, but with no right channel to provide them.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;That’s why I chose to join Securonix. Securonix has a great platform to deliver many capabilities that organizations need to tackle their threat detection and response problems. I first came into contact with Securonix before my Gartner life, and have been watching it grow and evolve since then. When we produced an UEBA solutions comparison, back in 2016, it was the best one of the batch. But it didn’t stop there.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;A few years ago Gartner said SIEM and UEBA would eventually converge. Securonix didn’t miss the trend. Actually, it was one of the main drivers. UEBA vendors first appeared in the SIEM Magic Quadrant back in 2017. Securonix was already there as a Visionary. Actually it was the vendor with the most complete vision at that time. Since then it managed to improve its ability to execute, becoming one of the leaders in the space. It hasn’t missed the major trends since then, adding important capabilities and quickly adapting to offer a great cloud SIEM solution.&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;p dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;&lt;span style=&quot;font-family: Arial; font-size: 11pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;Good tools are extremely important to anyone who wants to make a dent on the incredible threat detection and response challenges we face. I’m excited to help with the evolution of the best security operations and analytics platform available today. You can watch this great journey here, , on Linkedin and on Twitter (@apbarros).&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><link>http://blog.securitybalance.com/2020/08/im-joining-securonix.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-1663467687077472884</guid><pubDate>Fri, 28 Aug 2020 15:32:00 +0000</pubDate><atom:updated>2020-08-28T11:32:26.577-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - Goodbye!</title><description>&lt;p&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;I’m sadly writing this as my last Gartner blog post! I’m moving to a new challenge. After years as an analyst, I decided it was time to get closer to delivering the initiatives that have been the focus of my research.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;I’m immensely grateful for my time with Gartner. It has been a great experience and I had the opportunity to work with many bright people. I leave a special thank you to my mentor and main co-author, my great manager (thanks boss!) and my KIL (“Key Initiative Leader”, internal Gartner lingo).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Working as a Gartner analyst gives you the opportunity to go through incredible experiences. During the past five years, I was able to:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style=&quot;font-weight: 400&quot;&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Write groundbreaking research on my favorite topics in cybersecurity. It was very rewarding to find people out there building their strategic plans using some of my own words and adding the figures I drew to their slides.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400&quot;&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Deliver presentations to full audience rooms in many different places in the world.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400&quot;&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Provide advice to some of the major vendors in this industry, having very interesting conversations with their main executives.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400&quot;&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Discuss challenges and solutions with clients from all over the world and from many different industries. You just can’t imagine the crazy types of challenges they are facing out there! From exotic legal requirements to some very particular business characteristics, I have had many memorable calls during these years.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400&quot;&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Collaborate with very smart colleagues and have exciting (and, how can I say? “Lively”, maybe…) discussions about the future of cybersecurity.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-weight: 400&quot;&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Chair the Security Summit in Brazil for two years, working with amazing people and putting together unforgettable events. I will definitely miss the experience to prepare and deliver the opening keynote there!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;What I will miss mostly is experiencing those moments when you hear your client saying things like “that was the best advice I’ve ever heard”. Those are the moments that give an analyst a clear view of their sense of purpose. I’m really grateful for being able to go through that as a Gartner analyst.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;Thank you Gartner. Thank you my reader. And I hope you follow me back to &lt;a href=&quot;http://blog.securitybalance.com&quot;&gt;my personal blog&lt;/a&gt;. I’ll still be there.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style=&quot;font-weight: 400&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2020/08/28/goodbye/&quot;&gt;Goodbye!&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2EK5WLs&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2020/08/from-my-gartner-blog-goodbye.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-7400724252853947084</guid><pubDate>Fri, 17 Apr 2020 18:58:00 +0000</pubDate><atom:updated>2020-04-17T14:58:20.474-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - New Research: Open Source Tools!</title><description>&lt;p&gt;After finishing the wave of research that covered &lt;a href=&quot;https://blogs.gartner.com/augusto-barros/2020/01/29/updated-paper-penetration-testing-red-teams/&quot;&gt;pentesting&lt;/a&gt;, &lt;a href=&quot;https://blogs.gartner.com/augusto-barros/2020/04/09/developing-maintaining-security-monitoring-use-cases/&quot;&gt;monitoring use cases&lt;/a&gt;, &lt;a href=&quot;https://blogs.gartner.com/augusto-barros/2020/03/31/new-research-threat-intelligence-soar/&quot;&gt;SOAR and TI&lt;/a&gt;, I’m excited to start research for a net new document covering an exciting topic rarely covered in Gartner research: Open source tools! The intent is to look at the most popular open source tools used by security operations teams out there. Things like the ELK stack, Osquery, MISP and Zeek. What I’d like to cover in this new paper is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Why is the tool being used? Why not a commercial alternative?&lt;/li&gt;
&lt;li&gt;How is it being used? What is the role of the tool in the overall security operations toolset, what are the integrations in place?&lt;/li&gt;
&lt;li&gt;How much effort was put to implement the tool? What about maintaining it?&lt;/li&gt;
&lt;li&gt;Is it just about using it or is there some active participation on the development of tool as well?&lt;/li&gt;
&lt;li&gt;What are requirements to get value from this tool? Skills? Anything specific in terms of infrastructure, or processes?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It is a fascinating topic, which bring a high risk of scope creep, so the lists of questions answered and tools covered are still quite fluid.&lt;/p&gt;
&lt;p&gt;In the meantime, it would be nice to hear stories from the trenches; what are you using out there? Why? Was that picked just because it was free (I know, TCO, etc, but the software IS free….) ? Or is it a cultural aspect of your organization? Do you believe it is actually better than the commercial alternatives? Why?&lt;/p&gt;
&lt;p&gt;Lots of questions indeed. Please help me provide some answers &lt;img src=&quot;https://s.w.org/images/core/emoji/12.0.0-1/72x72/1f642.png&quot; alt=&quot;🙂&quot; class=&quot;wp-smiley&quot; style=&quot;height: 1em; max-height: 1em;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2020/04/17/new-research-open-source-tools/&quot;&gt;New Research: Open Source Tools!&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2Kbxglh&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2020/04/from-my-gartner-blog-new-research-open.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-8071774594000260019</guid><pubDate>Thu, 09 Apr 2020 21:09:00 +0000</pubDate><atom:updated>2020-04-09T17:09:27.879-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - Developing and Maintaining Security Monitoring Use Cases</title><description>&lt;p&gt;My favorite Gartner paper has just been updated to its 3rd version! &lt;a href=&quot;https://www.gartner.com/document/3983277&quot;&gt;“How to Develop and Maintain Security Monitoring Use Cases”&lt;/a&gt; was originally published in 2016 as a guidance framework for organizations trying to identify what their security tools should be looking for, and how to turn these ideas into signatures, rules and other content. This update brings even more ATT&amp;amp;CK references and a new batch of eye candy graphics! So much different than the original Visio built graphics!&lt;/p&gt;
&lt;p&gt;This is the anchor diagram from the doc, summarizing our framework:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://blogs.gartner.com/augusto-barros/files/2020/04/464715_0001.png&quot;&gt;&lt;img class=&quot;alignnone wp-image-279&quot; src=&quot;https://blogs.gartner.com/augusto-barros/files/2020/04/464715_0001.png&quot; alt=&quot;&quot; width=&quot;500&quot; height=&quot;380&quot; srcset=&quot;https://blogs.gartner.com/augusto-barros/files/2020/04/464715_0001.png 911w, https://blogs.gartner.com/augusto-barros/files/2020/04/464715_0001-300x228.png 300w, https://blogs.gartner.com/augusto-barros/files/2020/04/464715_0001-768x583.png 768w&quot; sizes=&quot;(max-width: 500px) 100vw, 500px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Some nice quotes from doc:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;“Some organizations create too much process overhead around use cases — agility and predictability are required. Processes must not be too complex because security monitoring requires fast and constant changes to align with evolving threats.”&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;“The efficiency and effectiveness of security monitoring are directly related to the appropriate implementation and optimization of the right use cases on the right security monitoring tools.”&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;“Do not simply enable everything that comes with the tools. A considerable part of that content may not be aligned with the organization’s priorities, or may not be applicable to its environment.”&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;“Make use case development similar to agile software development by being able to quickly implement or modify a use case to adapt to changing threat and business conditions.”&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I hope you enjoy it, and let me know if you have the framework implemented in your organization. Please don’t forget to&amp;nbsp;&lt;a href=&quot;http://surveys.gartner.com/s/gtppaperfeedback&quot;&gt;provide feedback about the paper here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Next wave of research is about Open Source tools for threat detection and response, in parallel with interesting stuff on Breach and Attack Simulation.&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2020/04/09/developing-maintaining-security-monitoring-use-cases/&quot;&gt;Developing and Maintaining Security Monitoring Use Cases&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2JQhigf&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2020/04/from-my-gartner-blog-developing-and.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-5673882875764684732</guid><pubDate>Tue, 31 Mar 2020 20:01:00 +0000</pubDate><atom:updated>2020-03-31T16:01:12.731-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - New Research on Threat Intelligence and SOAR</title><description>&lt;p&gt;Since my &lt;a href=&quot;https://blogs.gartner.com/anton-chuvakin/2019/06/06/the-last-blog-post/&quot;&gt;blogging whip was gone&lt;/a&gt; I haven’t been posting as frequently as I’d like, but I realized we had recently published new versions of some of our coolest research and I completely missed announcing them here! So let me talk a bit about them:&lt;/p&gt;
&lt;p&gt;The first one is a big update to our Threat Intelligence research, conducted by Michael Clark. The paper now is called &lt;a href=&quot;https://www.gartner.com/document/3981261&quot;&gt;“How to Use Threat Intelligence for Security Monitoring and Incident Response”&lt;/a&gt;. It has a more specific scope and is more prescriptive in its guidance, providing a nice framework for those planning to start using TI on their detection and response processes:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://blogs.gartner.com/augusto-barros/files/2020/03/TI_framework.png&quot;&gt;&lt;img class=&quot;alignnone size-full wp-image-272&quot; src=&quot;https://blogs.gartner.com/augusto-barros/files/2020/03/TI_framework.png&quot; alt=&quot;&quot; width=&quot;620&quot; height=&quot;197&quot; srcset=&quot;https://blogs.gartner.com/augusto-barros/files/2020/03/TI_framework.png 620w, https://blogs.gartner.com/augusto-barros/files/2020/03/TI_framework-300x95.png 300w&quot; sizes=&quot;(max-width: 620px) 100vw, 620px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The other one is a &lt;a href=&quot;https://www.gartner.com/en/documents/3981938&quot;&gt;refresh on our paper about SOAR – Security Orchestration, Automation and Response&lt;/a&gt;, conducted by Eric Ahlm. It provides an overview of SOAR and how to assess your readiness for this technology according to your use cases:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://blogs.gartner.com/augusto-barros/files/2020/03/soar_paper.png&quot;&gt;&lt;img class=&quot;alignnone size-full wp-image-273&quot; src=&quot;https://blogs.gartner.com/augusto-barros/files/2020/03/soar_paper.png&quot; alt=&quot;&quot; width=&quot;620&quot; height=&quot;353&quot; srcset=&quot;https://blogs.gartner.com/augusto-barros/files/2020/03/soar_paper.png 620w, https://blogs.gartner.com/augusto-barros/files/2020/03/soar_paper-300x171.png 300w&quot; sizes=&quot;(max-width: 620px) 100vw, 620px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I hope you enjoy the new papers.&amp;nbsp; I’m also working on an update to my security monitoring use cases paper, it will hit the streets soon. Meanwhile, feel free to &lt;a href=&quot;http://surveys.gartner.com/s/gtppaperfeedback&quot;&gt;provide feedback about the papers above here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2020/03/31/new-research-threat-intelligence-soar/&quot;&gt;New Research on Threat Intelligence and SOAR&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2JzgjAV&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2020/03/from-my-gartner-blog-new-research-on.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-1013957999112425127</guid><pubDate>Wed, 29 Jan 2020 18:36:00 +0000</pubDate><atom:updated>2020-01-29T13:36:13.843-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - Updated Paper on Penetration Testing and Red Teams</title><description>&lt;p&gt;I finally managed to publish the update to my paper on pentesting, &lt;a href=&quot;https://www.gartner.com/doc/3980210&quot;&gt;“Using Penetration Testing and Red Teams to Assess and Improve Security”&lt;/a&gt;. It has some small tweaks from the previous version, including some additional guidance around &lt;a href=&quot;https://www.gartner.com/doc/3875421&quot;&gt;Breach and Attack Simulation tools&lt;/a&gt; role.&lt;/p&gt;
&lt;p&gt;Questions about how to define the scope of penetration tests are very common in my conversations with clients. I always tell them it should be driven primarily by their objective for running the test. Surprisingly, many have problems articulating why they are doing it.&lt;/p&gt;
&lt;p&gt;The discussion about comparing pentests with other forms of assessments is there too, although &lt;a href=&quot;https://www.gartner.com/document/code/349153&quot;&gt;we also published a paper focused on the multiple test methods some time ago&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;A few good pieces from the document:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“Research the characteristics and applicability of penetration tests and other types of security assessments before selecting the most appropriate one for the organization. Select a vulnerability assessment if the goal is to find easily identifiable vulnerabilities.”&lt;/p&gt;
&lt;p&gt;“Definitions for security assessments vary according to the source, with a big influence from marketing strategies and the buzzword of the day. Some vendors will define their red team service in a way that may be identified as a pentest in this research, while vulnerability assessment providers will often advertise their services as a penetration test. Due to the lack of consensus, organizations hiring a service provider to perform one of the tests described below should ensure their definition matches the one used by the vendor”&lt;/p&gt;
&lt;p&gt;“Pentests are often requested by organizations to identify all vulnerabilities affecting a certain environment, with the intent to produce a list of “problems to be fixed.” This is a dangerous mistake because pentesters aren’t searching for a complete list of visible vulnerabilities.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Next on the queue is the monitoring use cases paper. That’s my favorite paper and excited to refresh it again. You’ll see it here soon!&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2020/01/29/updated-paper-penetration-testing-red-teams/&quot;&gt;Updated Paper on Penetration Testing and Red Teams&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2Gx5wWq&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2020/01/from-my-gartner-blog-updated-paper-on.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-4326420206142624764</guid><pubDate>Fri, 25 Oct 2019 20:51:00 +0000</pubDate><atom:updated>2019-10-25T16:51:12.564-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - The New Vulnerability Management Guidance Framework</title><description>&lt;p&gt;After a huge delay I can finally announce that the &lt;a href=&quot;https://www.gartner.com/doc/3970669&quot;&gt;new version of our Vulnerability Management Guidance Framework&lt;/a&gt; is out! Although it is a refresh of a document that has gone through &lt;a href=&quot;https://blogs.gartner.com/augusto-barros/2015/09/30/vulnerability-management-have-we-reached-a-best-practices-plateau/&quot;&gt;many updates&lt;/a&gt; (&lt;a href=&quot;https://blogs.gartner.com/anton-chuvakin/2014/02/11/my-updated-vulnerability-management-practices-paper-publishes/&quot;&gt;even before my Gartner time&lt;/a&gt;), this one has some very nice new stuff to mention. First, we refreshed our VM cycle and it’s closer to the reality of most organizations now:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://blogs.gartner.com/augusto-barros/files/2019/10/vm-cycle.jpg&quot;&gt;&lt;img class=&quot;alignnone wp-image-263&quot; src=&quot;https://blogs.gartner.com/augusto-barros/files/2019/10/vm-cycle.jpg&quot; alt=&quot;&quot; width=&quot;600&quot; height=&quot;468&quot; srcset=&quot;https://blogs.gartner.com/augusto-barros/files/2019/10/vm-cycle.jpg 886w, https://blogs.gartner.com/augusto-barros/files/2019/10/vm-cycle-300x234.jpg 300w, https://blogs.gartner.com/augusto-barros/files/2019/10/vm-cycle-768x599.jpg 768w&quot; sizes=&quot;(max-width: 600px) 100vw, 600px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This versions includes a revamped prioritization section, as well as some additional content on vulnerability assessment options. In the past we left most of the VA content for another document, but now it’s back to the VM guidance.&lt;/p&gt;
&lt;p&gt;Some interesting pieces of this version:&lt;/p&gt;
&lt;section class=&quot;KeyFindings&quot;&gt;
&lt;ul class=&quot;bullets-yes&quot;&gt;
&lt;li&gt;
&lt;div class=&quot;para&quot;&gt;One of the most common ways to fail at VM is by simply sending a report with thousands of vulnerabilities to the operations team to fix. Successful VM programs leverage advanced prioritization techniques and automated workflow tools to streamline the handover to the team responsible for remediation.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div class=&quot;para&quot;&gt;Organizations adopting DevOps practices must adopt an approach integrated to continuous integration/continuous delivery (CI/CD) cycles and addressing issues at preproduction stages.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div class=&quot;para&quot;&gt;Include the identification of underlying issues as one of the main objectives of the VM process. Although it is still important to find and address individual vulnerabilities, VM should also provide insight into areas that need to be improved in the organization’s security posture.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;[On VA scanning frequency]&amp;nbsp;The ultimate frequency goal should reflect the value of providing refreshed vulnerability data to consumer processes, such as patching and security monitoring. If those processes will not benefit from more frequent scans, there is really no point in trying to achieve a higher frequency.&lt;/li&gt;
&lt;li&gt;Mitigation can often be the first line of defense, especially if it can be implemented quickly. However, mitigated vulnerabilities are not gone. They still need to be fixed eventually.&lt;/li&gt;
&lt;li&gt;All exceptions must have an expiration date. Do not allow indefinite exceptions.&lt;/li&gt;
&lt;/ul&gt;
&lt;/section&gt;
&lt;p&gt;In general, it’s a far clearer document and easy to read now. Thanks Anna Belak for your magical wordsmithing powers!&lt;/p&gt;
&lt;p&gt;We are always looking for detailed feedback on our papers. Feel free to&lt;a href=&quot;http://surveys.gartner.com/s/gtppaperfeedback&quot;&gt;&amp;nbsp;drop some comments here&lt;/a&gt;&amp;nbsp;if you read the doc.&lt;/p&gt;
&lt;section class=&quot;Recommendations&quot;&gt;&lt;/section&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/&quot;&gt;The New Vulnerability Management Guidance Framework&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2JlGOKL&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2019/10/from-my-gartner-blog-new-vulnerability.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-1442525087076781491</guid><pubDate>Tue, 15 Oct 2019 17:33:00 +0000</pubDate><atom:updated>2019-10-15T13:33:37.071-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - Our New Research on Incident Response Has Been Published</title><description>&lt;p&gt;We finally managed to publish our great new (in fact, refreshed) document on preparing for incident response, &lt;a href=&quot;https://www.gartner.com/doc/3970254&quot;&gt;“How to Implement a Computer Security Incident Response Program”&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This is the first document of my colleague &lt;a href=&quot;https://www.gartner.com/analyst/92746&quot;&gt;Michael Clark&lt;/a&gt;, who did a terrific job of modernizing some stuff &lt;a href=&quot;https://blogs.gartner.com/augusto-barros/2016/04/13/how-to-plan-and-execute-modern-security-incident-response-new/&quot;&gt;from a long time ago.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://blogs.gartner.com/augusto-barros/files/2019/10/preparing-ir.png&quot;&gt;&lt;img class=&quot;alignnone size-full wp-image-258&quot; src=&quot;https://blogs.gartner.com/augusto-barros/files/2019/10/preparing-ir.png&quot; alt=&quot;&quot; width=&quot;910&quot; height=&quot;421&quot; srcset=&quot;https://blogs.gartner.com/augusto-barros/files/2019/10/preparing-ir.png 910w, https://blogs.gartner.com/augusto-barros/files/2019/10/preparing-ir-300x139.png 300w, https://blogs.gartner.com/augusto-barros/files/2019/10/preparing-ir-768x355.png 768w&quot; sizes=&quot;(max-width: 910px) 100vw, 910px&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Some interesting pieces from this guidance document:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Organizations that practice their incident response program find gaps and areas for improvement. Certain exercises also make the computer security incident response team (CSIRT) more comfortable and better equipped when an incident occurs.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Include all the locations and services where your assets and data reside in the plan. This includes SaaS and company-controlled cloud assets. Many high-profile breaches involve elements outside the organization’s perimeter&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Detections that must be addressed are inevitable. Organizations are often forced into a response mode by attackers and third-party breach notifications.&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;As usual, we are always looking for detailed feedback on our papers. Feel free to &lt;a href=&quot;http://surveys.gartner.com/s/gtppaperfeedback&quot;&gt;drop some comments here&lt;/a&gt; if you read the doc.&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2019/10/15/new-research-incident-response-published/&quot;&gt;Our New Research on Incident Response Has Been Published&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2IRhDza&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2019/10/from-my-gartner-blog-our-new-research.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-2488655432778175446</guid><pubDate>Mon, 17 Jun 2019 04:21:00 +0000</pubDate><atom:updated>2019-06-17T00:21:27.548-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - Presenting at the Gartner Security and Risk Management Summit DC 2019</title><description>&lt;p&gt;This is literally a last minute blog post about my sessions at this year’s &lt;a href=&quot;https://www.gartner.com/en/conferences/na/security-risk-management-us&quot;&gt;Gartner Security and Risk Management Summit&lt;/a&gt;. This time I have three sessions:&lt;/p&gt;
&lt;p&gt;Tuesday 18, 2:30PM –&amp;nbsp;&lt;strong&gt;Debate: Changing Societal Perception of Cybersecurity&lt;/strong&gt;: This is a very fun debate with my colleague Paul Proctor, where we discuss the need to change society’s perception of security. Paul is trying his best, but I don’t think he can win this one &lt;img src=&quot;https://s.w.org/images/core/emoji/2.3/72x72/1f642.png&quot; alt=&quot;🙂&quot; class=&quot;wp-smiley&quot; style=&quot;height: 1em; max-height: 1em;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;Wednesday 19, 5:15PM –&amp;nbsp;&lt;strong&gt;Creating Security Monitoring Use Cases With the MITRE ATT&amp;amp;CK Framework&lt;/strong&gt;: The MITRE AT&amp;amp;CK framework has quickly become a popular tool for many security operations practices. This session illustrates how it can be used to address some of the most common challenges of security operations centers: How to create security monitoring use cases? How do we know if we are looking for right things? What should be the starting list of use cases on our SIEM deployment?&lt;/p&gt;
&lt;p&gt;Thursday 20, 10:45AM –&amp;nbsp;&lt;strong&gt;Further Evolution of Modern SOC: Automation, Delegation, Analytics:&amp;nbsp;&lt;/strong&gt;This presentation provides a structured approach to plan, establish and efficiently operate a modern SOC. Gartner clients with successful SOCs put the premium on people rather than process and technology. People and process overshadow technology as predictors for SOC success or failure. Among other things, it will cover questions such as: Do I need a SOC and can I afford it? Where can I rely on automation and where do I need to outsource or delegate? Can SOAR tools really automate my SOC?&lt;/p&gt;
&lt;div class=&quot;agenda-text&quot;&gt;&lt;/div&gt;
&lt;p&gt;This is one of the most fun weeks of the year for us Gartner analysts. For you attending the event and the sessions above, please let me know if you like them, what could the different and how we can improve.&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2019/06/17/presenting-gartner-security-risk-management-summit-dc-2019/&quot;&gt;Presenting at the Gartner Security and Risk Management Summit DC 2019&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://gtnr.it/2Im4DSs&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2019/06/from-my-gartner-blog-presenting-at.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-6078600643355297199</guid><pubDate>Thu, 02 May 2019 22:34:00 +0000</pubDate><atom:updated>2019-05-02T18:34:31.514-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - Considering Remediation Approaches For Vulnerability Prioritization</title><description>&lt;p&gt;As &lt;a href=&quot;https://blogs.gartner.com/anton-chuvakin/2019/05/02/upcoming-vulnerability-management-research/&quot;&gt;Anton said&lt;/a&gt;, we are starting our work on vulnerability management this year. One of the points I’ve started to look at more carefully is how much the different patching approaches can affect how we prioritize vulnerabilities for remediation.&lt;/p&gt;
&lt;p&gt;Expanding the prioritization of vulnerabilities to go beyond CVSS and include threat context is something we are seeing quickly moving to mainstream. Now it’s not uncommon to see organizations that don’t only look at how bad a vulnerability could be, but how much it is and even will be (great work on prioritization models by some vendors out there). This really helps reducing the noise and focus on what matters.&lt;/p&gt;
&lt;p&gt;But this is helpful when you look at vulnerabilities individually only. When they move to other side of the fence, however, the problem has some different nuances. IT operations don’t see vulnerabilities, &lt;em&gt;they see patches&lt;/em&gt;. And &lt;strong&gt;the relationship between patches and vulnerabilities are not always one-to-one&lt;/strong&gt;, and &lt;strong&gt;not all patches are equal&lt;/strong&gt;. There are those &lt;em&gt;“applied-periodically-automatically-with-no-intervention”&lt;/em&gt; types of patches, there are also the &lt;em&gt;“almost-never-released-and-when-installed-breaks-everything”&lt;/em&gt; types of patches. The IT Ops team may not even bother looking at the priority of the former but may want a very thorough justification for why they need to apply the latter.&lt;/p&gt;
&lt;p&gt;Many vulnerability management programs, because they are managed by the security team, do not consider the characteristics of the patching process when applying their prioritization criteria. But if they want to be taken seriously by IT Ops, they should. So, my questions here are:&lt;/p&gt;
&lt;p&gt;– When you prioritize vulnerabilities, do you incorporate “cost to patch” in your criteria?&lt;/p&gt;
&lt;p&gt;– If you do so, how? Does your tool set allow you to do it? Where is that information coming from?&lt;/p&gt;
&lt;p&gt;– If you define patching times by categories, have you considered patching characteristics for categorization? For example, do you define categories as something like “non-critical workstations” or like “windows workstations with auto-updates on”?&lt;/p&gt;
&lt;p&gt;– Do you look at the vendors of software deployed in your environment as part of this exercise? Patching Microsoft vs. Oracle, for example? Do you take into consideration the quality of the patches or release schedule of the vendor to define the patching times?&lt;/p&gt;
&lt;p&gt;We like to stay away from the patching problem as it seems more like an IT operations problem than a security problem. But I believe that proper prioritization (or at least one that will be useful for the goal of fixing vulnerabilities) should include something about the required patches too. If that’s correct, what are the tools available for that and how are organizations doing it?&lt;/p&gt;
&lt;p&gt;Please jump in and leave your experiences in the comments section!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2019/05/02/considering-remediation-approaches-vulnerability-prioritization/&quot;&gt;Considering Remediation Approaches For Vulnerability Prioritization&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://gtnr.it/2VcMTAS&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2019/05/from-my-gartner-blog-considering.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-5944288391531730421</guid><pubDate>Fri, 22 Feb 2019 17:07:00 +0000</pubDate><atom:updated>2019-02-22T12:07:22.069-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - The Deception Paper Update is Out!</title><description>&lt;p&gt;Good thing about when Anton is away is I’m always able to jump and announce our new research ahead of him &lt;img src=&quot;https://s.w.org/images/core/emoji/2.3/72x72/1f642.png&quot; alt=&quot;🙂&quot; class=&quot;wp-smiley&quot; style=&quot;height: 1em; max-height: 1em;&quot; /&gt;&lt;/p&gt;
&lt;p&gt;So, the update to our &lt;a href=&quot;https://www.gartner.com/document/3902378&quot;&gt;“Applying Deception Technologies and Techniques to Improve Threat Detection and Response”&lt;/a&gt; paper has finally been published. This is a minor update, but as with every updated paper, it has changed for better. Some of the highlights&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;New, and more beautiful pictures (thanks to our co-author Anna Belak for making our papers look 100% better on the graphics side!)&lt;/li&gt;
&lt;li&gt;Additional guidance on how to test deception tools (tip: put your Breach and Attack Simulation tool to use!)&lt;/li&gt;
&lt;li&gt;A better understanding on how the Deception Platforms are evolving and what are the current “must have” features you’ll find there&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href=&quot;https://blogs.gartner.com/augusto-barros/files/2019/02/Deception-blog.gif&quot;&gt;&lt;img class=&quot;alignnone wp-image-245&quot; src=&quot;https://blogs.gartner.com/augusto-barros/files/2019/02/Deception-blog.gif&quot; alt=&quot;&quot; width=&quot;650&quot; height=&quot;425&quot; /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We also tuned key findings and recommendations, including these:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Evaluate deception against alternatives like NTA, EDR, SIEM and UEBA to detect stolen-data staging, lateral movements, internal reconnaissance and other attack actions within your environment.&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Deploy deception-based detection approaches for environments that cannot use other security controls due to technical or economic reasons. Examples include IoT, SCADA, medical environments and highly distributed networks.&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We are also &lt;a href=&quot;https://blogs.gartner.com/anton-chuvakin/2018/09/06/next-research-deception-and-network-traffic-analysis/&quot;&gt;working on a solutions comparison on this area&lt;/a&gt;. A lot of exciting stuff on that one, stay tuned. Meanwhile, please &lt;a href=&quot;https://www.gartner.com/document/3902378&quot;&gt;check the new paper&lt;/a&gt; and &lt;a href=&quot;http://surveys.gartner.com/s/gtppaperfeedback&quot;&gt;don’t forget to provide feedback&lt;/a&gt;!&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2019/02/22/deception-paper-update/&quot;&gt;The Deception Paper Update is Out!&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2Xjdgm8&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2019/02/from-my-gartner-blog-deception-paper.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-5288481266633910350</guid><pubDate>Fri, 04 Jan 2019 18:34:00 +0000</pubDate><atom:updated>2019-01-04T13:34:07.781-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - More on “AI for cybersecurity”</title><description>&lt;p&gt;There is a very important point to understand about the vendors using ML for threat detection.&lt;/p&gt;
&lt;p&gt;Usually ML is used to identify known behavior, but with variable parameters. What does that mean? It means that many times we know what bad looks like, but not how &lt;strong&gt;&lt;em&gt;exactly&lt;/em&gt;&lt;/strong&gt; it looks like.&lt;/p&gt;
&lt;p&gt;For example, we know that data exfiltration attempts will usually exploit certain protocols, such as DNS. But data exfiltration via DNS can be done in multiple ways. So, what we do to detect it is to use ML to learn the normal behavior, according to certain parameters. Things like amount of data on each query, frequency of queries, etc. Anomalies on these parameters may point to exfiltration attempts.&lt;/p&gt;
&lt;p&gt;On that case ML helps us find something we already know about, but the definition is fuzzy enough that prevents us from using simple rules to detect it. This is an example of unsupervised ML used to detect relevant anomalies for threat detection. There are also many examples of using supervised ML to learn the fuzzy characteristics of bad behavior. But as you can see, a human had to understand the threat, how it operates, and then define the ML models that can detect the activity.&lt;/p&gt;
&lt;p&gt;If you are about to scream “DEEP LEARNING!”, stop. You still need to know what data to look at with deep learning, and if you are using it to learn what bad looks like, you still need to tell it what is bad. We ended up at the same place.&lt;/p&gt;
&lt;p&gt;Although ML based detection is a different detection method, the process is still very similar to how signatures are developed.&lt;/p&gt;
&lt;p&gt;What haven’t been done yet is AI that can find threats not defined by a human. Most vendors use misleading language to lead people to think they can do it, but that doesn’t exist. Considering this reality, my favorite question to these vendors is usually “what do you do to ensure new threats are properly identified and new models developed to identify them?”. Isn’t that interesting that people buy “AI” but keep relying on the human skills from the vendor to keep it useful?&lt;/p&gt;
&lt;p&gt;If you are a user of these technologies, you’ll usually need to know what the vendor does to keep what the tools looks for aligned to new threats. For the mature shops, you also need to know if the tool allows you to do that yourself, if you want/need.&lt;/p&gt;
&lt;p&gt;That’s a good way to start the conversation with a “Cybersecurity AI” vendor; see how fast they fall into the trap of “we can find unknown unknowns”.&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2019/01/04/more-on-ai-for-cybersecurity/&quot;&gt;More on “AI for cybersecurity”&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://gtnr.it/2AwXE4H&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2019/01/from-my-gartner-blog-more-on-ai-for.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7425230117947821661.post-4539624035049709162</guid><pubDate>Tue, 13 Nov 2018 18:41:00 +0000</pubDate><atom:updated>2018-11-13T13:41:18.925-05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Augusto Barros</category><category domain="http://www.blogger.com/atom/ns#">IFTTT</category><title>From my Gartner Blog - The new (old) SIEM papers are out!</title><description>&lt;p&gt;As Anton already mentioned &lt;a href=&quot;https://blogs.gartner.com/anton-chuvakin/2018/10/18/our-how-to-architect-and-deploy-a-siem-solution-publishes/&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;https://blogs.gartner.com/anton-chuvakin/2018/11/07/our-how-to-operate-and-evolve-a-siem-solution-publishes/&quot;&gt;here&lt;/a&gt;, our update of &lt;a href=&quot;https://blogs.gartner.com/augusto-barros/2016/02/03/siem-architecture-and-operational-processes-update/&quot;&gt;the big SIEM paper&lt;/a&gt; was turned into two new papers:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.gartner.com/doc/3891675&quot;&gt;How to Architect and Deploy a SIEM Solution&lt;/a&gt;&lt;br /&gt;
SIEM is expected to remain a mainstay of security monitoring, but many organizations are challenged with deploying the technology. This guidance framework provides a structured approach for technical professionals working to architect and deploy a SIEM solution.&lt;br /&gt;
Published: 16 Oct 2018&lt;br /&gt;
&lt;a href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;Anton Chuvakin&lt;/a&gt; | &lt;a href=&quot;http://www.gartner.com/AnalystBiography?authorId=54703&quot;&gt;Anna Belak&lt;/a&gt; | &lt;a href=&quot;http://www.gartner.com/AnalystBiography?authorId=55278&quot;&gt;Augusto Barros&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://www.gartner.com/doc/3892576&quot;&gt;How to Operate and Evolve a SIEM Solution&lt;/a&gt;&lt;br /&gt;
Managing and using a SIEM is difficult, and many projects are stuck in compliance or minimal value deployments. Most SIEM challenges come from the operations side, not broken tools. This guidance supports technical professionals focused on security working to operate, tune and utilize SIEM tools.&lt;br /&gt;
Published: 05 Nov 2018&lt;br /&gt;
&lt;a href=&quot;http://www.gartner.com/AnalystBiography?authorId=55278&quot;&gt;Augusto Barros&lt;/a&gt; | &lt;a href=&quot;http://www.gartner.com/AnalystBiography?authorId=40636&quot;&gt;Anton Chuvakin&lt;/a&gt; | &lt;a href=&quot;http://www.gartner.com/AnalystBiography?authorId=54703&quot;&gt;Anna Belak&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We decided to split the document so we could expand on those two main activities, deploying and operating a SIEM, without the worry of building a document so big it would scare away the readers. A great secondary outcome of that is we were able to put together separate guidance frameworks for each one of those activities. Some of my favorite pieces of each doc:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Deploy&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;“User and entity behavior analytics (UEBA)-SIEM convergence allows organizations to also include UEBA-centric use cases and machine learning (ML) capabilities in their deployment projects.” (&lt;em&gt;A hype-less way to talk about “OMG AI AI!”&lt;/em&gt;)&lt;/p&gt;
&lt;p&gt;“Staff shortages and threat landscape drive many organizations to SaaS SIEM, co-managed SIEM and service-heavy models for their SIEM deployments and operation.” (&lt;em&gt;Because, in case you haven’t noticed, SIEM NEEDS PEOPLE TO WORK&lt;/em&gt;)&lt;/p&gt;
&lt;p&gt;“Adopt the “output-driven SIEM” model, where nothing comes into a SIEM tool unless there is a clear knowledge of how it would be used.” &lt;em&gt;(I know it’s old, but hey, this is our key advice for those deploying SIEM! So, still a favorite)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;“Deploy use cases requiring constant baselining and anomaly detection, such as user account compromise detection, using ML/advanced analytics functions previously associated with UEBA” (&lt;em&gt;because it’s not all marketing garbage; these use cases are the perfect fit for UEBA capabilities&lt;/em&gt;)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Operate&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;“Creating and refining security monitoring use cases is critical to an effective SIEM. User-created and customized detection logic delivers the most value.” (&lt;em&gt;because ongoing SIEM value REQUIRES use case management&lt;/em&gt;)&lt;/p&gt;
&lt;p&gt;“Develop the key operational processes for SIEM: run, watch and adapt. When necessary, fill the gaps with services such as MSS and co-managed SIEM” &lt;em&gt;(we promoted “tune” to “adapt”)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;“Prepare and keep enough resources to manage and troubleshoot log collection issues. New sources will be added; software upgrades change log collection methods and formats; environment changes often cause collection disruption.” &lt;em&gt;(ML capabilities, big data tech, all that is cool, but a big chunk of SIEM work is still being able to get the data in)&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The post &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros/2018/11/13/the-new-old-siem-papers-are-out/&quot;&gt;The new (old) SIEM papers are out!&lt;/a&gt; appeared first on &lt;a rel=&quot;nofollow&quot; href=&quot;https://blogs.gartner.com/augusto-barros&quot;&gt;Augusto Barros&lt;/a&gt;.&lt;/p&gt;
&lt;br /&gt;
&lt;br /&gt;
from Augusto Barros https://ift.tt/2OEUctf&lt;br /&gt;
via &lt;a href=&quot;https://ifttt.com/?ref=da&amp;amp;site=blogger&quot;&gt;IFTTT&lt;/a&gt;
</description><link>http://blog.securitybalance.com/2018/11/from-my-gartner-blog-new-old-siem.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>