Tag Archives: response

My latest Gartner research: Forecast Snapshot: Endpoint Detection and Response, Worldwide, 2017

3 March 2017  |  The EDR market will present large opportunities and grow at a CAGR of 45.27% from 2015 through 2020, dwarfing overall IT security and endpoint protection growth rates. Buyer demand for improved detection and response to augment failing protection methods are fueling growth….

Gartner clients can access this research by clicking here.




Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner research:Competitive Landscape: Endpoint Detection and Response Tools

5 January 2017  |  …EPP providers starting to offer EDR features. At least 50% of endpoint detection and responseproviders will incorporate enhanced analytics of user and attacker…the next 12 to 24 months, up from less than 15% today. The endpoint detection and response (EDR…

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: Intelligent and Automated Security Controls Impact the Future of the Security Market

Product leaders need insights into the expansion of threat intelligence and adaptive security capabilities across the security market. These new emerging capabilities will be instrumental in defining the future of adaptive security and how incident response automation will evolve into the future. … …

Gartner clients can read this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Intel Assessment: Weak Response to Breaches Will Lead to More Cyber Attacks

http://freebeacon.com/national-security/intel-assessment-obama-admin-response-to-cyber-encourages-more-attacks/ By Bill Gertz Follow @BillGertz Washington Free Beacon July 28, 2015 The United States will continue to suffer increasingly damaging cyber attacks against both government and private sector networks as long as there is no significant response, according to a recent U.S. intelligence community assessment. Disclosure of the intelligence assessment, an analytical consensus of 16 U.S. spy agencies, comes as the Obama administration is debating how to respond to a major cyber attack against the Office of Personnel Management. Sensitive records on 22.1 million federal workers, including millions cleared for access to secrets, were stolen by hackers linked to China’s government. U.S. officials familiar with the classified cyber assessment discussed its central conclusion but did not provide details. Spokesmen for the White House and office of the director of national intelligence declined to comment. Recent comments by President Obama and senior military and security officials, however, reflect the intelligence assessment. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner research: Emerging Technology Analysis: Deception Techniques and Technologies Create Security Technology Business Opportunities

Deception techniques such as honeypots are not a new concept in security; however, new techniques and capabilities promise to deliver game-changing impact on how threats are faced. This research articulates how product managers can successfully use threat deception as a threat response tactic.

Gartner subscribers can read this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] 96% of UK corporations have been hacked, new data reveals

http://www.information-age.com/technology/security/123459657/96-uk-corporations-have-been-hacked-new-data-reveals By Ben Rossi Information Age 12 June 2015 New data has revealed that 96% of UK corporations have seen hackers successfully penetrate their IT systems in an attempt to steal, change or make public important data. Whilst many firms are actively engaged in policies to safeguard against cybercrime, 9.1% of UK firms have not acted to protect themselves from hacking. The data was gathere in the latest round of the Global Business Outlook Survey, conducted by Grenoble Ecole de Management, Tilburg University and the Fuqua School of Business, Duke University. The survey, which ended June 5, has been conducted for 77 consecutive quarters, making it the world’s longest-running and most comprehensive research on senior finance executives. This round elicited over 1000 responses from global CFOs and finance directors. More than half (53%) of CFOs in the UK also indicated that difficulty in hiring and retaining qualified employees is a top three concern, while the second most cited concern was rising wages and salaries. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] How can SCADA security be improved for oil and gas companies

http://www.energyglobal.com/downstream/special-reports/29052015/How-can-SCADA-security-be-improved-for-oil-and-gas-companies-089/ By Deborah Galea Manager, OPSWAT. 29/05/2015 According to the recently released 2015 Dell Security Annual Threat Report, SCADA attacks are on the rise. The report found that in 2014 the number of attacks on Supervisory Control and Data Acquisition (SCADA) systems doubled compared to the previous year. Most of these attacks occurred in Finland, the UK, and the US, probably due to the fact that in these countries SCADA systems are more likely to be connected to the internet. The Dell Report came on the heels of findings from the US Industrial Controls Systems Cyber Emergency Response Team (ICS-CERT) showing that energy was the most targeted sector for attack among all critical infrastructure providers. “Since companies are only required to report data breaches that involve personal or payment information, SCADA attacks often go unreported,” said Patrick Sweeney, Executive Director of Dell Security. “This lack of information sharing combined with an aging industrial machinery infrastructure presents huge security challenges that will continue to grow in the coming months and years.” This does not come as a surprise to those in hydrocarbons. Many SCADA and industrial control systems (ICS) were built decades ago when cyber security was not yet an issue for the industry. There has been an inevitable collision as operational technology (OT) systems like SCADA come into closer contact with IT management modalities, introducing risks as systems not designed for outside connectivity are exposed to the internet. In addition to their importance for hydrocarbons, SCADA systems control key functions for other critical infrastructure providers, such as utilities, airports and nuclear plants. Successful attacks on SCADA systems could potentially cause disruptions in services that we all depend on every day. For this reason, SCADA attacks are often politically motivated and backed by foreign state actors with motives such as industrial espionage and major supply chain disruption. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] The FBI’s Stance on Encrypted Communications

http://blogs.wsj.com/experts/2015/04/20/the-fbis-stance-on-encrypted-communications/ By Amy Hess Executive Assistant Director of the Federal Bureau of Investigation. Apr1l 20, 2015 {This post is in response to the article, Should Law Enforcement Have the Ability to Access Encrypted Communications} AMY HESS: Imagine an America where federal, state, and municipal law enforcement agencies cannot access critical communications, even when legally authorized to do so. Imagine a time when the police cannot pursue logical leads in electronic data to rescue a missing child, identify the co-conspirators of a massive fraud scheme, or obtain relevant evidence of an elected official’s public corruption. Imagine the injustice if a suspected criminal can hide incriminating communications without fear of discovery by the police, or if information that could exonerate an innocent party is inaccessible. With the move to ubiquitous encryption, that time is closer than you think. Increasingly, law enforcement investigations require some degree of access to encrypted communications—whether stored on a computer or mobile device, or transmitted over a communication service provider’s network—and that access is increasingly limited. The FBI firmly supports the development and adoption of robust encryption as a key tool to strengthen cybersecurity, secure commerce and trade, safeguard private information, and promote free expression and association. However, absolute encryption does not mean absolute safety. Terrorists and other criminals also use encryption to conceal and facilitate their crimes. No one in this country should be beyond the law. The notion that electronic devices and communications could never be unlocked or unencrypted – even when a judge has decided that the public interest requires accessing this data to find evidence — is troubling. It may be time to ask: Is that a cost we, as a society, are prepared to pay? […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail