For anyone reading the news regularly, it’s not hard to grasp that cyber threats are getting more sophisticated and damaging by the day. From a security technology provider’s perspective, I can add that tackling them is a fast mounting challenge for the millions of businesses that come under attack daily.

 

Modern cybersecurity technologies – assuming you have already put in place the right professionals, policies and processes – are a must but organizations deploying them need to look beyond the boxes that sit on their racks.

 

What underpins the security appliances is invisible, but plays a pivotal role in ensuring that those boxes block the threats that imperil your business. Threat intelligence – or more specifically, the security appliances’ ability to know the ins-and-outs of the evolving threat landscape and respond to them appropriately – is the fuel that powers your cyber defences.

 

Getting timely, accurate and predictive threat intelligence is much tougher than it sounds. It calls for a robust R&D set-up, which comprises a few components:

 

1.Divide and conquer – In many aspects of business, large teams equate to large outputs. When trying to outsmart well motivated cybercriminals, however, following conventional wisdom seldom works well. In my experience, an effective threat research organisation should be made up of many small teams, with each team dedicated to a particular type of threat. Creating such research focuses boosts each team’s specialization and competency – leading to faster discovery of threats, and the identification of more threats – while shortening customer response times to incidents.

 

2.Stay fleet-footed – Threat research teams must be nimble. The threat landscape is highly dynamic, changing by the day, or even hours and minutes. The teams must be able to adjust their priorities and refocus on the fly. At Fortinet, for instance, based on our projections of how the threat landscape will evolve, research plans are updated. From the new directions identified, researchers with the most appropriate skill sets are selected to join specific task forces to delve into those emerging threats. Examples of such threats in recent times include IoT, ransomware and autonomous malware.

 

3.See the big picture – Researchers must be encouraged to think big and pursue their own interests, even if those interests don’t have a direct link to the company’s products. Research on IoT vulnerabilities, for instance, can deepen an enterprise security provider’s understanding of the threat landscape.

 

4.Hone your instincts – Research leaders must train their teams to develop the acumen to identify a threat as important before that fact becomes obvious to all. Good threat researchers, for instance, have been warning for years that IoT vulnerabilities are the next big menace – before the Mirai IoT botnet appeared last September and made it plain to the world. Threats emerge and evolve swiftly. If a security provider is slow to research on them and react, its customers will be slow to get protected.

 

5.Amass data – The more data a threat research team has access to, the greater the potential of its research outcome. Enlightened research organizations share – not hoard – information. At Fortinet, for example, beyond tapping the 3 million sensors we have deployed around the globe, we actively exchange threat intelligence with organizations like INTERPOL, NATO, KISA and other security technology providers through the Cyber Threat Alliance. In recent months, we have also succeeded in bringing on board more government entities and carriers globally. That’s a positive development, as it helps all parties build a bigger threat database to monitor, block and trace malware back to their sources.

 

6.Invest in research technology – The days of manually analyzing threat information have long passed us by. Effective research teams need advanced tools to interpret and correlate the reams of data coming through to them every second. While today we have Content Pattern Recognition Languages (CPRLs) to help identify thousands of current and future virus variants with a single signature, the future belongs to technologies like big data analytics and artificial intelligence. Soon, AI in cybersecurity will constantly adapt to the growing attack surface. Today, human beings are performing the relatively complex tasks of connecting the dots, sharing data and applying that data to systems. In future, a mature AI system will be able to automate many of these complex decisions on its own.

 

No matter how advanced AI becomes, however, full automation – or the passing of 100% of the control to machines to make all the decisions all the time – is not attainable. Human intervention will still be needed. Big data and analytics platforms allow malware progression to be predicted but not malware mutation. Only the human mind could have foreseen that ransomware like Wannacry would embed the National Security Agency’s vulnerability exploits to propagate on unpatched systems.

 

Malware evolution will intrinsically follow human evolution and how people blend new technologies into their everyday life. If in the coming years, for instance, self-driving cars and wearable IoT find widespread adoption, cybercriminals will – as they have always done – find ways to ride the wave and exploit those cars and devices. Likewise, cryptocurrencies, if they continue to find favor at the rate they gained momentum this year, will attract herds of hackers.

 

The concept of automation is opening up many new possibilities for cybercriminals, and turning up the heat on organizations. As hackers step up the amount of automation in their malware, attacks will not only come at organizations faster, they will also reduce the time between breach and impact, and learn to avoid detection. Increasingly, firms will need to respond in near real time – in a coordinated fashion across the distributed network ecosystem, from IoT to the cloud. Not many enterprises have the capability to do this today, and that’s something CIOs should start worrying about.


RECOMMENDED ARTICLE FOR TECHWORLD


 
Q3 2017 Akamai State of the Internet / Security Report Reveals Significant Increase in Web Application Security Attacks, Evolution of Attacker Strategies
Techworld Date Posted: 1 December 2017 3:40 PM | 202 Views
Newly released data shows that web application attacks continued to rise significantly in both the quarter-over-quarter and year-over-year timeframes, according to the Third Quarter, 2017 State of the Internet / Security Report released by.... See More
 
Q3 2017 Akamai State of the Internet / Security Report Reveals Significant Increase in Web Application Security Attacks, Evolution of Attacker Strategies
Techworld Date Posted: 3:40 PM | 202 Views
Newly released data shows that web application attacks continued to rise significantly in both the quarter-over-quarter and year-over-year timeframes, according to the Third Quarter, 2017 State of the Internet / Security Report released by...See More

 
Fortinet Reports Third Quarter 2018 Financial Results
Techworld Date Posted: 6 November 2018 4:07 PM | 69 Views
Fortinet® (Nasdaq: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced financial results for the third quarter of 2018.. See More
 
Fortinet Reports Third Quarter 2018 Financial Results
Techworld Date Posted: 4:07 PM | 69 Views
Fortinet® (Nasdaq: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, has announced financial results for the third quarter of 2018.See More

 
LuckyMouse Group Is Back and Using a Legitimate Certificate to Sign Malware
Techworld Date Posted: 14 September 2018 3:20 PM | 121 Views
The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor – LuckyMouse. . See More
 
LuckyMouse Group Is Back and Using a Legitimate Certificate to Sign Malware
Techworld Date Posted: 3:20 PM | 121 Views
The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely related to the infamous Chinese-speaking threat actor – LuckyMouse. See More

 
Kaspersky Lab Announces Opening of New APAC Headquarters
Techworld Date Posted: 14 July 2017 2:17 PM | 167 Views
To support the expansion of its business in Asia Pacific, Kaspersky Lab today announces the opening of a new location in Singapore for its regional HQ. There are currently 37 Kaspersky Lab offices in 32.... See More
 
Kaspersky Lab Announces Opening of New APAC Headquarters
Techworld Date Posted: 2:17 PM | 167 Views
To support the expansion of its business in Asia Pacific, Kaspersky Lab today announces the opening of a new location in Singapore for its regional HQ. There are currently 37 Kaspersky Lab offices in 32...See More

 
Free Tickets or Free Malware: Kaspersky Lab Warns Against Fake Airline Promos Online
Techworld Date Posted: 9 May 2018 5:04 PM | 160 Views
Summer holidays are when most people’s penchant for travel heats up. But it’s also the time when cybercriminals trick those with wanderlust easily so Kaspersky Lab advises Filipinos to be more vigilant against airline.... See More
 
Free Tickets or Free Malware: Kaspersky Lab Warns Against Fake Airline Promos Online
Techworld Date Posted: 5:04 PM | 160 Views
Summer holidays are when most people’s penchant for travel heats up. But it’s also the time when cybercriminals trick those with wanderlust easily so Kaspersky Lab advises Filipinos to be more vigilant against airline...See More

 
Nokia 6 and Nokia 8110 4G Are Now Out in Philippine Market
Techworld Date Posted: 17 May 2018 10:46 AM | 526 Views
Because we listen to our fans, the new Nokia 6 is made even better to become more than just a smartphone that processes, clicks and communicates, but rather a companion you can trust, depend.... See More
 
Nokia 6 and Nokia 8110 4G Are Now Out in Philippine Market
Techworld Date Posted: 10:46 AM | 526 Views
Because we listen to our fans, the new Nokia 6 is made even better to become more than just a smartphone that processes, clicks and communicates, but rather a companion you can trust, depend...See More

 
Team Group Leads Industry with MoStash Reader for iOS and the WC0C Charging Cable with 3-in-1 Connector
Techworld Date Posted: 8 September 2017 1:29 PM | 184 Views
September 7th, 2017, Taipei, Taiwan - Team Group is continuously dedicated to satisfying the needs of our consumers in every aspect so today Team Group announces the latest mobile peripherals with rich features with.... See More
 
Team Group Leads Industry with MoStash Reader for iOS and the WC0C Charging Cable with 3-in-1 Connector
Techworld Date Posted: 1:29 PM | 184 Views
September 7th, 2017, Taipei, Taiwan - Team Group is continuously dedicated to satisfying the needs of our consumers in every aspect so today Team Group announces the latest mobile peripherals with rich features with...See More

 
XPG SX8200 Named as One of the Best SSDs on the Market
Techworld Date Posted: 2 June 2018 10:05 AM | 252 Views
ADATA’s XPG SX8200 M.2 2280 SSD has been named as one of the best SSDs on the market by tech media Tom’s Hardware. Receiving a 9/10 score, the reviewer cited the SSD’s strong consumer.... See More
 
XPG SX8200 Named as One of the Best SSDs on the Market
Techworld Date Posted: 10:05 AM | 252 Views
ADATA’s XPG SX8200 M.2 2280 SSD has been named as one of the best SSDs on the market by tech media Tom’s Hardware. Receiving a 9/10 score, the reviewer cited the SSD’s strong consumer...See More

 
Nokia Unites with JUSTICE LEAGUE to Power Up #Bothie Experience
Techworld Date Posted: 17 November 2017 11:47 AM | 169 Views
Philippines, 17 November 2017 – HMD Global, the home of Nokia phones, unites with the blockbuster film JUSTICE LEAGUE to power up its range of Android smartphones - the Nokia 3, 5, and 6,.... See More
 
Nokia Unites with JUSTICE LEAGUE to Power Up #Bothie Experience
Techworld Date Posted: 11:47 AM | 169 Views
Philippines, 17 November 2017 – HMD Global, the home of Nokia phones, unites with the blockbuster film JUSTICE LEAGUE to power up its range of Android smartphones - the Nokia 3, 5, and 6,...See More

 
Love Is Getting in the Way of Users’ Internet Security, Warns Kaspersky Lab
Techworld Date Posted: 23 March 2018 1:21 PM | 243 Views
If you’re in a relationship, ask yourself this question – are you the cyber-savvy one of the two? Or are you the one that’s always leaning on your partner for help when you have.... See More
 
Love Is Getting in the Way of Users’ Internet Security, Warns Kaspersky Lab
Techworld Date Posted: 1:21 PM | 243 Views
If you’re in a relationship, ask yourself this question – are you the cyber-savvy one of the two? Or are you the one that’s always leaning on your partner for help when you have...See More


Power by

Download Free AZ | Free Wordpress Themes