Story image

The definitive guide to identifying, qualifying, and responding to cyber threats

22 Nov 2017

As the chief security officer (CSO) of an organisation, the odds can often feel like they’re stacked against you.

With new ransomware, phishing, and other threats being reported every day, it can get overwhelming trying to keep your organisation safe.

In order to minimise risk, organisations need to have a cybersecurity strategy that combines comprehensive visibility, continuous monitoring, advanced analytics and efficient incident response orchestration.

This will ensure they’re well-positioned to identify and respond to the early indicators of an intruder and neutralise the threat before it can result in a material cyber incident.

When putting a strategy together, it’s difficult to know whether to commit to prevention or detection.

Karen Scarfone and Steve Piper’s e-book, the Definitive guide to security intelligence and analytics, recommends a balanced approach utilising both.

Scarfone and Piper say using preventive controls will stop less-skilled attackers, which reduces the noise and using detective controls will expedite identification of advanced attackers, preventing them from inflicting major data breaches and causing other significant damage.

Most importantly, CSOs need a robust security intelligence and analytics platform to help them make sense of the information and be able to action it quickly.

The e-book by Scarfone and Piper covers key points for CSOs like

  • Understanding a cyber attack life cycle
  • Gathering forensic data for managing cyber threats
  • Qualifying threat intelligence
  • Scoping, designing, and deploying a security intelligence and analytics platform.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.