Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Eight Tactics for Circumventing Insider Security Threats

    By
    Chris Preimesberger
    -
    September 11, 2015
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Eight Tactics for Circumventing Insider Security Threats

      1 - Eight Tactics for Circumventing Insider Security Threats

      Although perimeter defenses aren’t impenetrable, firms can aggressively hit back at cyber-criminals and insider threats using big data security analytics.

      2Use Machine Learning

      2 - Use Machine Learning

      With the massive number of potential threats security monitoring systems are flagging, it’s no wonder that analysts are suffering from alert overload. Forget about trying to connect the dots and discovering multi-stage attacks because deciding which of the events need investigation is daunting. For example, of the 166 million security events at the 2012 London Olympics, only 783 required investigation (SC Magazine, July 2015). When working with data at such massive scale, machine learning is the only way to effectively offload the work of accurately identifying the security events that need human attention.

      3Do It Automatically

      3 - Do It Automatically

      Profiling across time and detecting advanced attacks should happen continuously and automatically. It’s not something that security professionals (who are in short supply) should have to initiate manually. Given that cyber-attacks are constantly evolving, it’s important to automatically identify changing attack patterns without the need for labeled training samples. That means unsupervised algorithms, which can learn without the need for human intervention, must be integral to any machine learning-based defense against cyber-criminals.

      4Use Big Data Analytics

      4 - Use Big Data Analytics

      Big data gives enterprises capabilities that were previously reserved for organizations with huge security budgets. Low-cost distributed computing enables advanced machine learning analytics, data correlation and rapid search across massive volumes of data from disparate sources. Low-cost storage means relevant security data can be retained for far longer periods than what was possible with traditional security monitoring solutions. This enables analysts to perform historical impact assessments and threat hunting further in the past, which is important, given that the median time to discover advanced attacks is currently 205 days (M-Trends 2015: “A View from the Front Lines,” FireEye, February 2015).

      5Integrate With Existing Infrastructure

      5 - Integrate With Existing Infrastructure

      Enterprises spend heavily on security and IT, so any solution for combating advanced attacks should leverage these investments. Logs should be ingestible natively from the source (such as Domain Name System logs) or from a security information and event management (SIEM) solution. New solutions should be able to stand on their own, but most users don’t want another management console, so application programming interfaces that make it easy to incorporate your security analytics solution’s output into the console of your choice (such as your SIEM console) are a must.

      6Fuse Relevant Security Data

      6 - Fuse Relevant Security Data

      Organizations have large amounts of log, flow, packet, file, alert and threat feed data, which can yield intelligence for thwarting cyber-criminals. How? Correlate data so it is attributed to a user, a host or an application. Then distill it into summaries that provide rich context (authentication and device use histories, port-protocol relationships, etc.). Security analytics that use varied security data sources provide better visibility than do analytics using a single data source. Using correlation and distillation, security professionals are better positioned to discover hidden adversaries.

      7Profile Across Time

      7 - Profile Across Time

      Multi-stage attacks stay under the radar by performing actions that individually do not rise to the level of a security alert. To detect attacks where the alerts do not rise above the noise requires reviewing threat information over extended periods and stringing together seemingly unrelated actions.

      8Maintain Layered Forensics

      8 - Maintain Layered Forensics

      Even with automatic machine learning-based systems, a security professional’s intervention is required. They need to perform spot checks to ensure that defense systems are working properly and also to make the final decision on whether an event is real. Forensics provides security analysts with the context as to why something was flagged but should include more than just packet data—it needs to include machine logs, packet header analysis, the time history of actions, outputs from machine learning algorithms and more. Hence the term layered forensics.

      9Ensure Rapid Search

      9 - Ensure Rapid Search

      “Have my defenses been breached?” is a question security analysts must be able to answer, and quickly. They can answer that question by rapidly testing hypotheses, which requires search, coupled with forensics, to provide the context across the raw data and any computed data. Given the magnitude of data inundating organizations, and the silos within which it typically resides, search is often a tedious exercise in time wasting and comes to a halt. Search must happen across massive amounts of data, executing rapidly without degrading the performance of the existing security infrastructure.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.