Network Security | SC Media

Network Security


Hitachi ID Bravura Security Fabric

Cybersecurity has long been a challenge across industries. Now that most organizations are firmly in the age of digital transformation, protecting against threats is increasingly complex but also crucial to shield against financial and reputational damage. With hybrid infrastructures accommodating modern and legacy assets, resources in the cloud, the Internet of Things (IoT), operational technology (OT), and remote workforces connecting via any device anywhere in the world, organizations face a cyberattack landscape that is constantly evolving.

Download this data sheet to see how The Hitachi ID Bravura Security Fabric empowers organizations to better navigate this difficult terrain with a resilient, flexible, single identity and access management (IAM) platform and framework.

Hitachi ID Bravura Privilege

Want to provide frictionless, elevated, and time-limited access to reduce IT security risk and enhance accountability?

Download this data sheet to see how Hitachi ID Bravura privileged access management (PAM) solution supports over a million daily password randomizations and facilitates access for thousands of authorized users, applications, and systems through a highly available, geo-redundant architecture.

Build a Solutions-Driven Culture with a Modern Identity

Where competing IT priorities and limited resources hang in a delicate balance, you have to invest where you'll see the biggest impact. Digital identity, connecting students and staff to information that builds knowledge, is an opportunity for pivotal efficiency gains.

Read this report to see how Hitachi ID Suite is the fabric that protects student, staff, and affiliate identities independent of location, allows appropriate access, and facilitates secure privileged access to critical assets all in one flexible platform.

Privileged Access Management for Healthcare

The healthcare industry is subject to strict privacy-protection obligations. Weak controls over access to data can lead to unauthorized sharing of patient data at best and to disruption to healthcare delivery at worst. At a larger scale, the hospitals and other healthcare delivery institutions can be shut down by malware or ransomware, which can lead to injury or death of patients. The safety, legal and financial impact of unauthorized access could not be higher.

Read this report to see how Hitachi ID Privileged Access Manager (HiPAM) addresses risks due to shared, static passwords used to sign into sensitive accounts with elevated privileges.

Report: 2020 Phishing By Industry Benchmarking

Find out how you are doing compared to your peers of similar size.

As a security leader, you're faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up!

IT security seems to be a race between effective technology and clever attack methods. However, there's an often overlooked security layer that can significantly reduce your organization's attack surface: New-school security awareness training.

The study analyzed a data set of nearly four million users across 17,000 organizations with over 9.5 million simulated phishing security tests. In this report, research from KnowBe4 highlights employee Phish-Prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks. Taking it a step further, the research also reveals radical drops in careless clicking after 90 days and 12 months of new-school security awareness training.

Do you know how your organization compares to your peers of similar size?

Download this report to find out!

You will learn more about:

  • New phishing benchmark data for 19 industries
  • Understanding who's at risk and what you can do about it
  • Actionable tips to create your "human firewall"
  • The value of new-school security awareness training
Analyzing the Economic Benefits of Google Chronicle Security Analytics Platform

Never before has it been so critical for security teams to effectively secure the infrastructure for an increasingly remote workforce while they themselves may have limited physical access to on-premises resources. Those organizations that can deploy their security analytics and operations in the cloud are in a better position to continue to provide a secure infrastructure to the business.

This ESG Economic Validation focuses on the cost savings organizations can expect from deploying Google Chronicle to obtain continuous analysis of security telemetry.

Chronicle Healthcare Customer Case Study

A US based healthcare sector market leader was contending with constantly growing security telemetry volumes.

Over the years, growth of infrastructure and new security tools had significantly expanded the aggregate log volume their SOC needed to access for investigations. Meanwhile low and slow (APT) threats warranted longer retention periods with quick or hot access but queries were already taking too long. Scaling their existing on-premise SIEM solution would imply higher license costs as well as more infrastructure to buy, deploy and manage. The deployment of a modern EDR, valuable for its rich telemetry but voluminous in its logging output, drove them to start identifying new solutions to address their security analytics challenges and needs.

Read this case study to see why this market leader chose Chronicle to address their security challenges.

Redefining Security Analytics with Chronicle

The threats and technology environments around us have changed radically. Security professionals lament that they must manage threats that originated in the 1980s, which means that old threats never leave; new threats simply pile on.

It is clear that the environments an organization must secure and monitor have also dramatically expanded. Much of this change is additive - in addition to mainframes and Windows servers, there are cloud platforms, mobile, and SaaS. As a result, there is more of everything - both threats and assets - to protect. As such, the tools that help detect threats, enable incident responders, and perform security monitoring must change as well.

Read this whitepaper to find out how does security monitoring and threat detection need to change, how can it accommodate the older and the newer systems, while the new (e.g., containers, cloud, and IoT) continue to grow.

The Value of Threat Intelligence with DomainTools: Identify Threats 82% Faster

There is an increasing chasm between the number of qualified cybersecurity professionals and the number of people needed to fill those roles. DomainTools is a vendor that seeks to address these challenges by offering a context rich threat intelligence solution. DomainTools offerings involve using indicators, including domains and IP addresses, to develop risk assessments, profile attackers, guide investigations, and map cyber activity to attacker infrastructure.

Download this white paper to learn how DomainTools Threat Intelligence solution can help empower your security teams to:

  • Identify threats 82% faster
  • Proactively identify 3x more threats
  • Reduce events by 42%
  • Lower chance of incidents by 19%
  • Improve productivity for threat investigation teams by 51%
Protected Waters: No Spear Phishing Allowed

Blocking against all phishing attempts is costly, time intensive and arguably impossible. This paper will discuss how to get ahead of Phishing scams and the spear phisher's infrastructure and techniques. Rather than waiting for spear phishing emails to hit the network, security teams can get ahead of the spear phishers and proactively block emerging campaigns. Spear phishing is far more dangerous than generalized attacks, which are often caught by email filters or discarded and/or flagged by users. Therefore, you must target the attackers that are specifically targeting you, and exploit the weaknesses in their approaches. In this paper we will cover:

  • How to detect and block targeted spear phishers
  • The best strategies to proactively keep an eye on all of the domains your organization is resolving
  • In depth break down of how to take action while Phishing campaigns are still in the preparation phase
2020 SANS Automation and Integration Survey

Automation and integration initiatives, projects and solutions balance machine-based analysis with domain-based knowledge to help security teams better support their organizations by achieving a level of optimized workflows and improving how security point solutions are used. Because this is the second year for the automation and integration survey, we are able to gain some perspective on the progress being made in automation and integration. The survey shows that respondents are definitely committing to automation and integration projects with a primary goal of improving how staff engage with their organizations through improved processes.

This survey includes information surrounding:

  • The evolution of automation in the organization
  • Changes in organizational approach to automation
  • The SOCs impact on automation of incident response
SANS Top New Attacks and Threat Report

There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In times of economic uncertainty, it is even more critical for security teams to prioritize resources to increase effectiveness and efficiency in dealing with known threats while also minimizing the risk from emerging attacks. For the past 14 years, the SANS "Five Most Dangerous Attacks" expert panel at the annual RSA Conference has filled that gap. This SANS whitepaper begins with a baseline of statistics from three of the most reliable sources of breach and malware data, then summarizes the expert advice from the SANS instructors on the RSA panel, detailing the emerging threats to look out for in 2020 and beyond—and what to do about them. This report includes information surrounding:

  • 2020 Breach and Threat Data
  • The top new attacks and threats
  • Best practices for improving defenses
2020 Ponemon Survey Report: Staffing the IT Security Function in the Age of Automation

Ponemon Institute conducted the third annual study "Staffing the IT Security Function in the Age of Automation: A Study of Organizations in the United States and United Kingdom" to better understand how organizations are addressing the problem of attracting and retaining IT security practitioners and how the adoption of automation and artificial intelligence (AI) will impact IT security. More than 1,000 IT and IT security practitioners who participate in attracting, hiring, promoting and retaining IT security personnel within their companies were surveyed. Ponemon Institute conducted a similar study in 2013, 2018, and 2019. Whenever possible, this report will show research findings from the previous study. While the lack of in-house IT security expertise continues to be a problem, the key takeaway in this year's study is that the majority of respondents (51 percent) now believe that automation will decrease headcount in the IT security function, an increase from 30 percent in last year's study. Further, more respondents believe they will lose their jobs in an average of four years, an increase from 28 percent of respondents to 37 percent of respondents since last year. Possible reasons for these perceptions are that automation, according to the findings, can improve the effectiveness and efficiency of the IT security staff so in the future fewer will need to be hired. Below are a few key takeaways from this research:

  • Automation will improve productivity but the human factor is still important.
  • Seventy-four percent of respondents say automation is not capable of performing certain tasks that the IT security staff can do and 54 percent of respondents say automation will never replace human intuition and hands-on experience.
  • Barriers to investing in automation continue to be the lack of in-house expertise (53 percent of respondents) and a heavy reliance on legacy IT environments.
  • Automation increases the productivity of current security personnel (43 percent of respondents) and reduces the false positive and/or false negative rates (43 percent of respondents).
  • Sixty percent of respondents say automation is helping to reduce the stress of their organization's IT security personnel.
SANS 2021 Cyber Threat Intelligence Survey

Cyber Threat Intelligence (CTI) is analyzed information about the capabilities, opportunities, and intent of adversaries conducting cyber operations. Adversaries tend to operate in and across digital networks and equipment that shape and impact businesses, critical infrastructure, and our daily lives. Understanding how threats are targeting information, systems, people, and organizations helps organizations and individuals alike understand how to perform threat hunting and security operations, respond to incidents, design better systems, understand risk and impact, make strategic changes, and protect themselves from future harm.Even with the difficulties that 2020 brought, CTI work has continued to grow and mature—a record number of organizations report that they have clearly communicated intelligence requirements as well as methods and processes in place to measure the effectiveness of CTI programs. These improvements continue to show the resilience of the field and the value of CTI as a resource for clarity and prioritization when complex challenges arise.This survey also includes information surrounding:

  • The value of CTI
  • The reversal of recent CTI trends
  • How organizations and CTI analysts are adapting to remote work
  • Improvements regarding automated tools and processes
  • How the CTI field is growing and next steps for the community
Security Orchestration Automation and Response (SOAR) Buyer’s Guide

Research conducted by ESG found that 58% of organizations have a threat intelligence program, however with a reliance on manual processes and incompatible tools, organizations struggle to realize the value of threat intelligence. To meet these challenges, some security teams are aiming to effectively operationalize threat intelligence through the fundamentals of people, processes, and technology. When aligning people, process, and technology, you get the ideal cross section for SOAR (Security Orchestration, Automation, and Response) platforms.

Before diving into SOAR, it is important to understand the precursor to implementing a SOAR solution, and that is proper logging. SIEM solutions combine SIM (Security Information Management) and SEM (Security Event Management) functions into one security management system. SIEM solutions collect and aggregate log data that is generated within a technology infrastructure, including applications, network traffic, endpoint events, etc. From the aggregated data, SOCs (Security Operations Centers) and CSIRTs (Cyber Security Incident Response Teams) can then detect events and incidents for further analysis.

Security Information and Event Management (SIEM) Buyer’s Guide

Security Information and Event Management (SIEM) is an approach to security management that combines security information management (SIM) and security event management (SEM) functions into one security management system. The foundational principle of SIEM is the aggregation of data that is relevant to an organization from multiple sources. Certain organizations will leverage a SIEM solution to stop abnormalities and associate an action. Sophisticated organizations will leverage correlated data in conjunction with user and entity behavior analytics (UEBA) or security orchestration and automated response (SOAR).

SIEM solutions have become an integral piece of IT and Security operations. When looking to onboard a SIEM solution, consider the following:

  • Threat Intelligence Fields
  • Forensic Capabilities
  • Integrations
  • Artificial Intelligence / Machine Learning
  • Compliance Reporting
Detecting Malicious Domains Using Artificial Intelligence and Machine Learning

Cyberattacks are a top priority in most IT organizations; the risk associated with ransomware attacks, data breaches, business email compromise, and supply chain attacks has garnered that significant attention be made to IT resources and budget to address these threats. The challenge in building a comprehensive security strategy designed to prevent attacks is the ever-changing threat landscape.

In recent years, we've heard more and more about the use of Artificial Intelligence (AI) and Machine Learning (ML) to help make security efforts more current, effective, and responsive. But every vendor is claiming to use AI/ML today. It can create a ton of buzz and hype, reflecting the "state of the art," but the question remains does it bring any practical value?

To help clear up the confusion, in this paper, we'll provide a high-level definition of both AI and ML from a security perspective, as well as how to practically apply the principles of each to domains in an effort to demonstrate how they are used to spot malicious traffic before it becomes a problem.

In this paper we will cover:

  • Clear definitions of both artificial intelligence and machine learning
  • The value of applying artificial intelligence and machine learning to malicious domains
  • Proactive threat predictions and protection with machine learning
Strategies to Vet Your Threat Intelligence and Reduce False Positives

Is it possible to overcome the daunting challenge of knowing everything that's going on inside and outside the network? Tarik Saleh, Senior Security Engineer at DomainTools believe the answer is yes—if security teams take new approaches to how they think about, vet and validate intelligence, indicators and adversary behaviors.This paper will discuss detection strategies to reduce false positives, and models that improve threat hunting and investigations outcomes. It will also cover leading tools that help teams make the most of their limited time and resources.

This paper includes information surrounding:

  • Types of threat detection
  • Strategies to fine-tune threat detection and response
  • Tools to support a behavior-led detection strategy


Defending against mail-borne attacks

Secure email gateways are supposed to be just that — secure. Unfortunately, like many other security appliances, gateways can be fooled and compromised. The key is knowing what to look for and how to mitigate and overcome the risks related to malware getting past the gateways and into users' mailboxes.

This special report looks at secure email gateways and secure web gateways, identifying their vulnerabilities and how these legacy products remain relevant.