Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/25/2012
09:54 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Radware's Attack Mitigation Black Belt Challenge Reveals IT Professionals' Strengths And Weaknesses Of Top Security Threats

Pinpoints leading areas of knowledge that IT managers need to improve upon to enhance their attack mitigation proficiency

Radware® (NASDAQ: RDWR), a leading provider of application delivery and application security solutions for virtual and cloud data centers, today announced that common problems with a cloud scrubbing solution, attributes of financially motivated attacks, ineffective deployment of web application firewalls and popular hacktivist attack tools are the leading areas of knowledge that IT managers need to improve upon to enhance their attack mitigation proficiency. These topics were identified based on the results of the company's Attack Mitigation Black Belt Challenge, a five-week contest that provided IT managers with a real-time assessment of their industry expertise of current security topics, including constantly evolving risks, attack techniques and regularly used security and control solutions.

Click here for more of Dark Reading's Black Hat articles.

The Challenge took participants through assessments comprised of 10 cyber security-related questions. All participants began at the novice, or White Belt, level and advanced to higher expert belt levels - Yellow, Green, Red, then Black Belt - by correctly answering increasingly difficult questions. Each round revealed the areas where IT managers need to improve their security expertise most, derived from the subject matter of the questions that were frequently answered incorrectly. Among them were:

More than 63 percent of White Belt participants were unable to correctly identify the most common problem with a cloud scrubbing-solution (Correct answer: The time it takes to start effective scrubbing once the service is initiated). Nearly 60 percent of Yellow Belt participants could not distinguish attributes of a financially-motivated attack technique (Correct answer: Focus on monetizing targeted electronic data, "Loud" aggressive & persistent, single-vector intrusions). Forty-three percent of White Belt participants could not identify the most ineffective deployment of a web application firewall used to mitigate threats (Correct answer: Span-port). Nearly 39 percent of White Belt participants could not select the least favorite tool of the group Anonymous in hacktivism attacks (Correct Answer: Raptor).

"Out of the 383 participants that started the Challenge, nearly 10 percent had the required security expertise needed to complete the four levels and achieve Black Belt Status," said Carl Herberger, Radware's vice president of Security Solutions who also developed and administered the Challenge. "This statistic should be a fire bell to the IT security industry. We hope that this disparity is the catalyst for IT managers and security professionals to pursue professional educational classes that will not only enhance their attack mitigation expertise, but also help them apply that newly developed knowledge to better protect their companies' networks."

The Challenge results did hold some good news, as participants were adept at understanding cyber security issues such as Advanced Persistent Threats, DoS and DDoS attacks.

More than nine out of 10 participants could positively identify attributes of Advanced Persistent Threats (Correct answers: Spread over days and/or weeks, leverage multiple vectors, combine zero-day - known vulnerabilities and reconnaissance). Ninety-three percent of participants could identify the primary cited reason for launching a DoS or DDoS attack (Correct answer: Political/hacktivism). One hundred percent of participants knew that a "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate use of that service.

"It is imperative for IT managers to have a real-time assessment of their attack mitigation expertise, so they can properly defend their enterprises' networks and applications," continued Herberger. "As the challenge unfolded, the real security experts started to shine with the average scores increasing to more than 95 percent. One of these experts will become the Attack Mitigation Black Belt Champion."

Announcing the Attack Mitigation Black Belt Champion

The Black Belt Challenge Champion will be announced July 25 at a ceremony in Radware's Black Hat USA 2012 booth (# 624) at 7:00 P.M. (PT). The Champion will be selected among the Black Belt-level players who finished all of the rounds in the shortest total amount of time and will receive a package that includes $1,495 towards early conference registration to Black Hat 2013, plus $2,000 towards conference training, and $1,500 cash allowance towards travel and accommodation.

For more information about The Attack Mitigation Black Belt Challenge, please visit the Radware corporate blog at http://www.blog.radware.com.

About the Attack Mitigation Black Belt Challenge

As sources for the questions, Herberger drew from his years of experience as one of the nation's leading authorities on application and network security, as well as from the 2011 Radware Global Application & Network Security Report - research on the state of global cyber security published by Radware's Emergency Response Team (ERT).

Participants had 90 seconds to answer each question. A minimum of nine correct answers was required to pass each round, and players who pass received an email with their digital colored belt for that level along with a special code to advance to the next round. Players had numerous chances to retake the test if needed. Once players passed all five rounds, they achieved Black Belt status, which qualified them to become the Attack Mitigation Black Belt Challenge Champion. The contest ended July 23.

About Radware

Radware (NASDAQ: RDWR), is a global leader of application delivery and application security solutions for virtual and cloud data centers. Its award-winning solutions portfolio delivers full resilience for business-critical applications, maximum IT efficiency, and complete business agility. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit http://www.radware.com.

Radware encourages you to join our community and follow us on; LinkedIn, Radware Blog, Twitter, YouTube and the Radware Connect app for iPhone®.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21360
PUBLISHED: 2021-03-09
Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic ...
CVE-2021-21361
PUBLISHED: 2021-03-09
The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed...
CVE-2021-24033
PUBLISHED: 2021-03-09
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoke...
CVE-2021-21510
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
CVE-2020-27575
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.