Eight Tactics for Circumventing Insider Security Threats

  • 12 September 2015
  • 0 replies
  • 5 views

Userlevel 7
By Chris Preimesberger 
 
http://www.eweek.com/imagesvr_ce/5843/25115hackprotectiontitle.jpghttp://www.eweek.com/imagesvr_ce/itbe/images/btn-next-off.png

Eight Tactics for Circumventing Insider Security Threats

Although perimeter defenses aren't impenetrable, firms can aggressively hit back at cyber-criminals and insider threats using big data security analytics. Realistically, so-called complete security protection for enterprises is impossible because cyber-criminals are becoming more resourceful, relentless and nefarious. They are more agile and more motivated because hacking is their meal ticket. Their tactics to deliver malware that remains inactive until triggered or to pose as authorized users have been refined—not only to increase effectiveness, but also to remain undetected for as long as possible. Although perimeter defenses will be breached, organizations can aggressively hit back at cyber-criminals and at insider threats using big data security analytics (BDSA). "We've reached the limits of [older] technology," former RSA President Art Coviello said of the currently available security information management (SIM) tools. "Organizations must be able to gain full visibility into all data—structured and unstructured, internal and external," and use new-gen analytics for risk assessment. In this slide show, based on research from FireEye and SC Magazine and interviews with executives at security analytics platform maker Niara and other companies, we offer key tactics organizations can use to detect attacks on the inside and severely limit the damage they can do full article

0 replies

Be the first to reply!

Reply