Saudi-Turkish Military Committee discusses ways to enhance defense cooperation    Saudi Arabia strongly condemns burning of Gaza hospital by Israeli forces    Saudi Arabia extends $500 million economic aid package to support Yemen    Kuwait advances to semi-finals after thrilling draw with Qatar    Azerbaijan airline blames 'external interference' for plane crash    At least 69 dead after boat sinks in Morocco waters    Israel strikes Sanaa airport and other Houthi targets across Yemen    Two die in Sydney to Hobart yacht race    Lulu Retail expands in Saudi Arabia with two new stores    King Salman receives written message from Putin    Indonesia's Consultative Assembly speaker hails MWL's efforts in disseminating moderate image of Islam Sheikh Al-Issa receives Al-Muzani at MWL headquarters in Makkah    Saudi Arabia to host Gulf Cup 27 in Riyadh in 2026    Saudi Arabia, Bahrain secure wins in thrilling Khaleeji Zain 26 Group B clashes    Celebrated Indian author MT Vasudevan Nair dies at 91    RDIA launches 2025 Research Grants on National Priorities    RCU launches women's football development project    Financial gain: Saudi Arabia's banking transformation is delivering a wealth of benefits, to the Kingdom and beyond    Blake Lively's claims put spotlight on 'hostile' Hollywood tactics    Five things everyone should know about smoking    Do cigarettes belong in a museum    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Filipino pilgrim's incredible evolution from an enemy of Islam to its staunch advocate    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Businesses in Kingdom need holistic tactics to avert threats
Published in The Saudi Gazette on 14 - 04 - 2016

In today's world where every business is always on and (close to) everything is always connected, there is no silver bullet when it comes to securing organizations' critical assets. To shorten response times and contain the largest number of threats possible, organizations in Saudi Arabia, need a holistic security approach that addresses the entire threat defense lifecycle, seamlessly integrates and offers a truly connected approach to putting actionable threat information and control at the fingertips of security management teams — all with the fastest available performance to enable the organization to take action in real time.
Attackers today use multiple techniques to penetrate an organizations' infrastructure and compromise their vital data assets or systems. This problem has only been exasperated with the proliferation of the cloud and IoT and today's targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.
As attacks grow in complexity, precision, and volume, yesterday's approach to Threat Intelligence (TI) is no longer adequate. Investigating targeted attacks is no easy task. The dynamic behavior of the attackers, the greater variety and availability of local and global threat intelligence sources, and the diversity of TI data formats can make the aggregation and digestion of threat intelligence into security operations center (SOC) tools more challenging than ever before.
A mixed-vendor environment, which is typical of most enterprises, adds to the difficulty of sharing event data and promoting event visibility throughout the organization. As Gartner points out in its report, Technology Overview for Threat Intelligence Platforms, "An organization's inability to share TI is an advantage to cyber threat actors. TI sharing is a force multiplier and is becoming a key element in keeping up with the increasing number of threat actors and the attacks they use".
Sharing threat intelligence alone will not necessarily result in sustainable corrective action and prevention. Security analysts can quickly become overwhelmed with too much information. Most security teams are engaged in an exhausting manual process of analyzing millions of security events and suspicious files in an effort to piece together a mountain of data and try to reconstruct the targeted attack. Ultimately, this impairs the thoroughness and speed of the response process. With a less-than-complete comprehension of threats, security teams are struggling to contain attacks in a timely manner.
These challenges result from insufficient integration between inspection, intelligence gathering, analytics, and enforcement elements of the security architecture. Silos of data and point controls complicate operations and increase risk. For example, the data each control generates and the context of each situation are poorly captured and seldom shared. A firewall may block a payload coming from an untrusted domain because it knows about communications, not malware. It will permit that payload coming through a trusted domain. Similarly, anti-malware could block unknown payloads received from known bad addresses if it knows to think beyond the payload or look within the payload to consider IP addresses.
Unintegrated security functions like these keep organizations in a firefighting mode, always reacting and pouring human resources into each breach. Process inefficiency exhausts scarce investigative resources and lengthens the timeline in which data and networks are exposed to determined attackers. These islands of security products, data sets, and operations give sophisticated attackers ample space and white noise in which to enter, hide, and persist within the targeted organization.
Integration improves effectiveness, as active sharing of data and accelerated cross-control processes make it practical and possible for every security control to leverage the strengths and experiences of the others around it. It is an adaptive threat prevention model that is quickly replacing traditional, unintegrated architectures as security teams work to achieve sustainable advantage against complex threats.
Rather than treating each malware interaction as a stand-alone event, an adaptive threat prevention model integrates processes and data through an efficient messaging layer. This provides reinforced levels of inspection and analysis informed by expanded forms of intelligence and connects end-to-end components to generate and consume as much actionable intelligence as possible from each contact and process.
The shift to adaptive threat prevention helps overcome the all-too-common functional fences that shackle detection, response, and any chance of improved prevention. — SG


Clic here to read the story from its source.