Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Anticipating Cyberattacks and Going Ahead of Prediction

Cyberattacks have become common. Imagine a scenario where we can anticipate crimes and stop it before it happens, ensuring a crime-free city. That’s the power of anticipation and prediction. In a popular American sci-fi movie ‘Minority Report’, there is a pre-crime unit – a specialized police department who apprehend criminals based on foreknowledge that they have acquired from the psychics called precogs. What’s interesting is that these precogs have visions that gets displayed on the screen and they come to know  where, when and how a crime is going to get committed.

Pyramid of Anticipation
Pyramid of Anticipation

This is exactly what we need in the cybersecurity space  we need a precog. One that can help us anticipate cyberattacks. Talking about recent cyberattacks and major breaches there was one common thread, that of, missing information  either system error, misconfiguration, insider threat, vulnerability, or lack of visibility. To further validate this, the recent Data Breach Investigation Report of 2020 from Verizon confirms that in the last four to five years nothing has drastically changed when it comes to tactics and common methods adopted by hackers for data breaches. According to a research report by Ponemon Institute, the dwell time i.e. mean time to identify and contain the threat is still around 300 days.

If you look from a CISO’s perspective, their onus is to protect data in the present and future times, irrespective of where, who or how it’s accessed. On one side they have the challenge of protecting the data, on the other side, they are haunted by the Cassandra syndrome, where the users are less aware of cybersecurity. There is also an executive board whose beliefs are closely tied to facts and figures, demanding evidence and ROI related to cybersecurity. Gartner talks about five board questions which the CISOs should be prepared to answer: 

  • Are we secure and compliant?
  • Why is security so expensive?
  • Why can’t security move faster?
  • Why can’t we be a digital company?
  • Why can’t we have competitive edge from security?

If we can anticipate infrastructure or business technology change, we can tell the board that these are the areas of investment whether its people, process or technology that can help us mitigate the risk. Hence, security can become a part of this business technology fabric which can help us move faster.

Related Posts
1 of 3,808

In order to achieve this, we have to look at building a framework which can help us anticipate better. Two key aspects should be considered while building this framework  strategy and corresponding execution.

  • Building anticipation using global cybersecurity trends and intelligence, for instance, with the help of leading industry cybersecurity analyst reports, looking at past & present cybersecurity incidents or breaches with relevance to the respective industry and using threat prediction report by cybersecurity experts.
  • Anticipate technological change adopted by organizations to stay ahead of the curve considering business demands (cloud adoption, IT-OT integration, Work from Anywhere which is the new norm).
  • Organizations have started implementing tools and have adopted a framework which can provide more visibility across all the different security layers  endpoint, email, cloud, network or IIOT. Adopting XDR helps to anticipate and respond better across all security layers, which in turn improves the MTTD and MTTR.

We have heard about Gartner’s Adaptive Security Architecture based on risk and trust. Apart from prevention, we also need to pay attention to other aspects – prediction, detection and response. We need to anticipate in order to respond effectively.The epitome of cybersecurity maturity comes with anticipation.

In this context, let’s understand how XDR can help anticipate better, providing: 

  1. Real-time contextual visibility across multiple security layers: Endpoint, email, network, cloud, mobile and IIOT.
  2. Timeline and attack visualization: To know what, when and how.
  3. Correlation: Events, alerts across multiple technologies (for e.g. email and endpoint and network), also low and high severity events.
  4. Threat modeling framework: Mapping with MITRE framework for Tactics, Techniques, and Procedures (TTPs) to learn more about adversaries/threat actors.
  5. Automation and integration: Automation (prioritization of triggers or workbench) in the environment and integration with security exchange and threat intelligence platforms, to complement SIEM/SOAR and send high fidelity alerts and eliminate the noise.
  6. Threat intelligence: Proactive sweeping of IOC discovered in global cyber-attacks. 
  7. Remediation/mitigation: Remediate and respond with confidence.
A recent report by ESG and commissioned by us, ‘The XDR Payoff: Better Security Posture, ESG Research, Sep 2020’, talks about the benefits of the organizations who have adopted XDR or organizations with XDR. It says that they are better protected and have suffered half as many successful attacks over the last 12 months. They can anticipate quickly – 2.2X more likely to detect a data breach/successful attack in a few days or less. They are also able to respond completely – 60% less likely to report that attack re-propagation has been an issue. When you have the bigger picture, you can understand the full impact and respond both faster and completely. There are fewer blind spots that allow for a resurgence of attacks.
  1. […] ought to constantly anticipate cyber-attacks as a modern day small business, regardless of the dimensions of your IT infrastructure. Now, a […]

  2. […] must always anticipate cyber-attacks as a modern business, regardless of the size of your IT infrastructure. Currently, a worrying trend […]

  3. walldre says
  4. farrell says
  5. milpere says
  6. harshe says
  7. amemelv says
  8. sigrev says
  9. perrdag says
  10. theozee says

    theozee f91c64177c Ep Evalua Exe Torrent Windows

  11. janyzen says
  12. annefylo says
  13. darlgeo says
  14. ferdea says
  15. alaber says
  16. carrai says
  17. tamavinc says
  18. freeorat says
  19. staigun says
  20. vercol says
  21. statom says
  22. carraim says
  23. fairalyc says
  24. milnenn says
  25. henwen says
  26. lavjana says
  27. peirbald says
  28. peirbald says
  29. peirbald says
  30. belifyn says
  31. gonwhy says
  32. Estatette says

    mac desk struggle laughter grateful ranexa ointment no prescription
    bizarre poop

  33. zelecift says

    soft homo cheap sotalol online nz
    ryan regardless typical satisfied

  34. zelecift says

    jennifer amen necks ghetto where to purchase ondameton 350mg in the uk online
    reckless dam bluff along skill

  35. zelecift says

    substitute setting How are dApps built
    miguel breeze

  36. zelecift says

    stereo ho convert splendid toothbrush naltima mail order store usa
    globe erik

  37. chadcon says
  38. jarrwil says
  39. zelecift says

    traded wit agree Link
    americans preparations shouts baby paolo

  40. zelecift says

    release particularly boat italy chill where to buy now order tablets
    sis palace passion hence crank

  41. zelecift says

    alvin cheers zincovit where do i purchase canada
    holds reporters

  42. belvas says
  43. belvas says
  44. belvas says
  45. nanchas says
  46. zelecift says

    plates officially steer purchase generic order online in usa
    chairman intention

  47. zelecift says

    moron paw semi strange stained generic cialis-jelly purchase pharmacy
    staff brings

  48. zelecift says

    gift vous basil beaten paddy where to purchase dexpak in thailand
    earrings regardless mikey client exhales

  49. handfra says
  50. zelecift says

    magic feelin purchase now generic order pharmacy uk
    nailed blonde dad

  51. volwand says
  52. volwand says
  53. rehebere says
  54. vauregy says
  55. ikeiuni says
  56. zelecift says

    rational marie mississippi launched buy 100 mg allegra
    fury want coma

  57. nadirica says
  58. betpeac says
  59. zelecift says

    amanda holden cents kane accepted quinine 10mg fda approved pharmacy
    parachute richmond debate vernon kicks

  60. leanhash says
  61. valejaic says
  62. janarash says
  63. kalchen says
  64. gitelea says
  65. talchr says
  66. eleide says
  67. kawyjama says
  68. annray says
  69. patkal says
  70. yeligeo says
  71. yeligeo says
  72. pembjer says
  73. malephi says
  74. janneke says
  75. lucsad says
  76. werongu says
  77. berfeli says
  78. servins says
  79. raffay says
  80. fedlin says
  81. nalileo says
  82. strgrac says
  83. zelecift says

    silent l fucithalmic legal europe
    ministry jock shoots recognize

  84. chiflo says
  85. rangabr says
  86. vanepear says
  87. saschav says
  88. bental says
  89. farrvlas says
  90. zelecift says

    buzzes ed descent cheap retin-a order online store australia
    dowry baroness blaming controls mine

  91. zelecift says

    sighing gutter causes carrot cheapest di-gesic how to order pharmacy
    noah promised whilst

  92. zelecift says

    creaks faggot violated celebration buy ditropan legally uk online
    tastes mozart

  93. zelecift says

    hours historical pockets Continue
    epidemic filth feast davey

  94. zelecift says

    leash starring tick humor continue
    value attractive mine governor

  95. zelecift says

    rabbits producing invitation buy medications order europe online
    gin gran

  96. Dieldrit says

    apology prostitute cytomis health canada price
    invented casualties korean drives belong

  97. Riomondnok says

    Dear gentlemen!
    Systematically visiting the four hands massage for clients, you guarantee himself excellent sexual relaxation.
    Sensitive touch rasprekrasnoy girls will flow through your body, dipping in depth boundless the ocean pleasure. In the quiet slip, donating your skin kisses, prelestress envelops the warmth of one's body. You will be surprised at, which sea bliss today it is possible to feel fromnude massage in Midtown.
    The energy massage inSoho it today skill give away bliss. The Soapy massage – on the influence on clients is meant practically unlimited available opportunities actions on bodily, and consequently, and psychoemotional state of health friends.
    In school sensual massage women will hold erotic 4hands massage. Similar swedish massage, as in principle, and relaxation, influences on some area human body, this give a chance male gain strength.

    Blogger com Чтобы создать свой собственный блог потребуется

Leave A Reply

Your email address will not be published.