Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/25/2012
09:54 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Radware's Attack Mitigation Black Belt Challenge Reveals IT Professionals' Strengths And Weaknesses Of Top Security Threats

Pinpoints leading areas of knowledge that IT managers need to improve upon to enhance their attack mitigation proficiency

Radware® (NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, today announced that common problems with a cloud scrubbing solution, attributes of financially motivated attacks, ineffective deployment of web application firewalls and popular hacktivist attack tools are the leading areas of knowledge that IT managers need to improve upon to enhance their attack mitigation proficiency. These topics were identified based on the results of the company's Attack Mitigation Black Belt Challenge, a five-week contest that provided IT managers with a real-time assessment of their industry expertise of current security topics, including constantly evolving risks, attack techniques and regularly used security and control solutions.

Click here for more of Dark Reading's Black Hat articles.

The Challenge took participants through assessments comprised of 10 cyber security-related questions. All participants began at the novice, or White Belt, level and advanced to higher expert belt levels - Yellow, Green, Red, then Black Belt - by correctly answering increasingly difficult questions. Each round revealed the areas where IT managers need to improve their security expertise most, derived from the subject matter of the questions that were frequently answered incorrectly. Among them were:

More than 63 percent of White Belt participants were unable to correctly identify the most common problem with a cloud scrubbing-solution (Correct answer: The time it takes to start effective scrubbing once the service is initiated). Nearly 60 percent of Yellow Belt participants could not distinguish attributes of a financially-motivated attack technique (Correct answer: Focus on monetizing targeted electronic data, "Loud" aggressive & persistent, single-vector intrusions). Forty-three percent of White Belt participants could not identify the most ineffective deployment of a web application firewall used to mitigate threats (Correct answer: Span-port). Nearly 39 percent of White Belt participants could not select the least favorite tool of the group Anonymous in hacktivism attacks (Correct Answer: Raptor).

"Out of the 383 participants that started the Challenge, nearly 10 percent had the required security expertise needed to complete the four levels and achieve Black Belt Status," said Carl Herberger, Radware's vice president of Security Solutions who also developed and administered the Challenge. "This statistic should be a fire bell to the IT security industry. We hope that this disparity is the catalyst for IT managers and security professionals to pursue professional educational classes that will not only enhance their attack mitigation expertise, but also help them apply that newly developed knowledge to better protect their companies' networks."

The Challenge results did hold some good news, as participants were adept at understanding cyber security issues such as Advanced Persistent Threats, DoS and DDoS attacks.

More than nine out of 10 participants could positively identify attributes of Advanced Persistent Threats (Correct answers: Spread over days and/or weeks, leverage multiple vectors, combine zero-day - known vulnerabilities and reconnaissance). Ninety-three percent of participants could identify the primary cited reason for launching a DoS or DDoS attack (Correct answer: Political/hacktivism). One hundred percent of participants knew that a "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate use of that service.

"It is imperative for IT managers to have a real-time assessment of their attack mitigation expertise, so they can properly defend their enterprises' networks and applications," continued Herberger. "As the challenge unfolded, the real security experts started to shine with the average scores increasing to more than 95 percent. One of these experts will become the Attack Mitigation Black Belt Champion."

Announcing the Attack Mitigation Black Belt Champion

The Black Belt Challenge Champion will be announced July 25 at a ceremony in Radware's Black Hat USA 2012 booth (# 624) at 7:00 P.M. (PT). The Champion will be selected among the Black Belt-level players who finished all of the rounds in the shortest total amount of time and will receive a package that includes $1,495 towards early conference registration to Black Hat 2013, plus $2,000 towards conference training, and $1,500 cash allowance towards travel and accommodation.

For more information about The Attack Mitigation Black Belt Challenge, please visit the Radware corporate blog at http://www.blog.radware.com.

About the Attack Mitigation Black Belt Challenge

As sources for the questions, Herberger drew from his years of experience as one of the nation's leading authorities on application and network security, as well as from the 2011 Radware Global Application & Network Security Report - research on the state of global cyber security published by Radware's Emergency Response Team (ERT).

Participants had 90 seconds to answer each question. A minimum of nine correct answers was required to pass each round, and players who pass received an email with their digital colored belt for that level along with a special code to advance to the next round. Players had numerous chances to retake the test if needed. Once players passed all five rounds, they achieved Black Belt status, which qualified them to become the Attack Mitigation Black Belt Challenge Champion. The contest ended July 23.

About Radware

Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit http://www.radware.com.

Radware encourages you to join our community and follow us on; LinkedIn, Radware Blog, Twitter, YouTube and the Radware Connect app for iPhone®.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...