Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
SPONSORED BY
8/15/2017
09:00 AM
Amy James
Amy James
Partner Perspectives
50%
50%

In Search of the Security Unicorn: Unified, Adaptive Defense

How enterprises can get an edge over innovative cybercriminals by creating a cycle of continual security posture adjustment within their own organizations.

Over the years, we’ve seen a lot of security tools come and go, while, at the same time, cybercriminals have built massive organizations that are operated with all the bells and whistles of a major corporation. According to Cybersecurity Ventures, the costs of cybercrime will grow to $6 trillion by 2021. That’s more than the GDP of a number of countries.

As a result of this explosive cybercrime growth, attackers can fund technology innovation that makes their endeavors more efficient and more destructive. One of their favorite and most cost-effective tactics is the adaptive exploit. This is malware that has been around for some time, then gets tweaked with a minor modification which makes it appear as 'never before seen.' It is both difficult to detect and very successful.

With all this dark side innovation, enterprise cyber defense is being soundly challenged.  One reason is because legacy security tools were built to solve a particular problem at a particular point in time. As threat conditions change, those aging tools do not. A lot of this has to do with the static nature of hardware and the labor-intensive nature of manually created policies. But even if a company conducts a rip- and-replace security refresh with the latest and greatest next generation stateful firewalls and advanced malware services, defense can be compromised if the enforcement policies that feed the solution are out of date or incomplete. Also, because these kinds of refreshes are expensive and time consuming, some companies put them off, which leads to unintended vulnerabilities. Ultimately, when these solutions are replaced with devices and capabilities similar to their predecessors, cybercrime innovation will again outperform the new system, continuing the cycle of security gaps.

Empowering Security with Automation

Take a page from our adversaries’ book and empower your cybersecurity solution with an adaptability engine that keeps protection current with dynamically generated enforcement directives created on the fly from real time intelligence on new threats entering the network -- and from the threat conditions already inside the network. As part of this protection ecosystem, orchestration of advanced enforcement policies is automated so that when conditions change, the enforcement adapts.

You’ll still have a network comprised of firewalls, switches and other devices from multiple vendors, but they will be unified in protecting your organization through a centralized point of data collection, processing and learning resulting in an agile security platform able to react to new threats in real time and predict future threat activity.

A truly adaptive and unified security platform will give organizations the edge over innovative cybercrime because it knows what matters most at any given moment in the threat environment, and can anticipate what happens next, creating a cycle of continual security posture adjustment.

This concept is not that new but it is one that few security providers have been able to deliver. For one reason, success in this arena requires open architectures with many integration hooks. With rigid frameworks, enterprises can find themselves locked into a specific vendor. Furthermore, according to a 2015 ZK Research Security Survey, with the average large enterprise operating with more than 32 security vendors in its environment, it may be near impossible for organizations to engineer a unified front. As you think about what comes next for your cybersecurity strategy, it is crucial to choose an approach that is built from the ground up to be adaptive, unified and effective. 

Amy James is a key security thought leader at Juniper Networks in her role as Lead Portfolio Marketing Manager for Security. She analyzes trends and conditions in the cybercrime climate to drive the narrative for Juniper's security portfolio. Out of her roots in email ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13881
PUBLISHED: 2020-06-06
In support.c in pam_tacplus 1.3.8 through 1.5.1, the TACACS+ shared secret gets logged via syslog if the DEBUG loglevel and journald are used.
CVE-2020-13883
PUBLISHED: 2020-06-06
In WSO2 API Manager 3.0.0 and earlier, WSO2 API Microgateway 2.2.0, and WSO2 IS as Key Manager 5.9.0 and earlier, Management Console allows XXE during addition or update of a Lifecycle.
CVE-2020-13871
PUBLISHED: 2020-06-06
SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.