Is the cybersecurity community’s obsession with compliance counter-productive?
Show me a large enterprise that was breached and I’ll show you a large enterprise adhering to multiple compliance standards.
News, stories and insights from the team at trackd
Show me a large enterprise that was breached and I’ll show you a large enterprise adhering to multiple compliance standards.
Starr sheds light on the significance of considering the human factor in cybersecurity breaches. He emphasizes the importance of collaboration and empathy between different teams and how vendors can contribute to fostering a more collaborative
IT professionals endure a lot more criticism for causing downtime when patching than they do for patching too slowly, so their default state is to be exceptionally cautious while absorbing the cyber risk of exposed
“I really enjoyed our cybersecurity self-training today, and really plan to change my behavior as a result of it” said just about no one anywhere, ever. And yet, when the topic of the “human factor
You don’t need to be a Large Language AI model or cyber spy to conclude that diligent and regular vulnerability remediation is a foundational element of enterprise cyber defense. If you were to embark on
Much more commonly, it’s the CISO and senior cybersecurity professionals that serve as the CEO’s scapegoat in the event of a major breach. Yet, it’s voluntary resignations that are primarily responsible for CISOs holding the lowest average
So even with the knowledge that 98 out of 100 patches are safe to deploy, remediation teams are unlikely to modify their processes to patch more aggressively any more than the average person would change
The primary new technology for server patching uses crowdsourced data on patches that have been applied to help guide remediation teams and highlight patches that have a history of disruption, and perhaps more valuably, those
Tell us when patches are disruptive? Sure. But more importantly, let us know when they’re not, information that’s potentially much more actionable.
As an IT or cybersecurity pro, much like a closer in baseball, you’re only the star of the movie when you fail, and when you succeed, it’s expected, and let’s face it, unappreciated. Day-in and
It’s time for vulnerability management technology innovators to spend less time identifying and reporting on vulnerabilities, and more time building tools to help IT teams fix them more efficiently…and without their fingers constantly crossed.
It probably makes sense to take the hyperventilating stories of cutting-edge attack vectors with a grain of salt. There will come a day when the primary means of initial penetration become obsolete or are abandoned by the cyber criminal community in favor of something revolutionary. However, the cyber security community – the good guys – will first need to render them ineffective and, unfortunately, we don’t seem to be close to achieving that reality.
The only thing that matters is whether the person responsible for product security is able to convince all stakeholders to care about the risks associated with the absence of secure software development practices or not. If they’re unable to do this then building security components into software will always be driven reactively as a result of an incident.
As a cyber security community, we need to re-think our commitment to – and investment in – compliance. Can we all agree it’s not working? If successful breaches were confined to organizations that either didn’t invest in compliance or were unsuccessful achieving it, then we could talk. But we all know that’s not the case. We need to start thinking about taking that 40% and investing more in the things that have the best chance of making the bad guys’ lives more difficult. We won’t win every battle, but at least we’ll be fighting the right war.
Show me a large enterprise that was breached and I’ll show you a large enterprise adhering to multiple compliance standards.
Starr sheds light on the significance of considering the human factor in cybersecurity breaches. He emphasizes the importance of collaboration and empathy between different teams and how vendors can contribute to fostering a more collaborative culture.
IT professionals endure a lot more criticism for causing downtime when patching than they do for patching too slowly, so their default state is to be exceptionally cautious while absorbing the cyber risk of exposed vulnerabilities.
“I really enjoyed our cybersecurity self-training today, and really plan to change my behavior as a result of it” said just about no one anywhere, ever. And yet, when the topic of the “human factor in cyber breaches” is discussed in any forum, recommendations always revert to the mean (and the cliche’): cybersecurity training.
You don’t need to be a Large Language AI model or cyber spy to conclude that diligent and regular vulnerability remediation is a foundational element of enterprise cyber defense. If you were to embark on a comprehensive security system design for your home, for example, you might consider alarms, video cameras, and even a guard dog, but you’d probably start by fixing the broken locks on your first floor windows. And that’s exactly the same thought process enterprises should adopt when defending themselves against an ever-expanding and sophisticated pool of attackers.
Much more commonly, it’s the CISO and senior cybersecurity professionals that serve as the CEO’s scapegoat in the event of a major breach. Yet, it’s voluntary resignations that are primarily responsible for CISOs holding the lowest average tenure figure among C-suite executives, lasting just 26 months compared to 5.3 years for their C-level counterparts.
Copyright © 2022-2024 trackd, inc.
All rights reserved.
Copyright © 2022-2024 trackd, inc.
All rights reserved.
Copyright © 2022-2024 trackd, inc.
All rights reserved.