Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Information Should Be Shared in Increments

    By
    Chris Preimesberger
    -
    April 9, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Information Should Be Shared in Increments

      1

      Open threat sharing requires more detailed, incremental programs for sharing; ones that start out with simple statistical sharing and then ramp up through programs of threat agent information (such as information about unsuccessful attacks and indicators of compromise information from discovered compromised hosts). Full data sharing of issues, such as breach details and successful threat actor attribution, will remain within a more limited audience.

      2IT Must Adapt to Support More Complex Levels of Sharing

      2

      More ambitious standards for communication of shared data are needed. These will encourage further expansion of sharing arrangements with the promise of more advanced security data analytics down the line. Currently, enterprises must create their own solutions for consuming intelligence data; without new standards, a high level of communication cannot happen.

      3Adoption of Tokenization

      3

      This can be implemented without significant effort and will be an important factor in allowing organizations to collaborate without undue legal or operational liability. Tokenization is the process of substituting a sensitive data element with an easily reversible benign substitute. It can be used to safeguard sensitive data involving, for example, bank accounts, financial statements, medical records, criminal records, driver’s licenses, loan applications, stock trades, voter registrations, and other types of personally identifiable information. Tokenization is a way for companies to share information about what they’re seeing on their networks, without giving away sensitive data in the process.

      4More Advanced Big Data Research

      4

      As the range of data necessary to formulate effective and adaptive intelligence can be applied automatically within the security program, exposures, attack surfaces and threat models will become immersed in data processing. This will enable some level of predictive processing to occur as security intelligence is consumed into the workflow.

      5Signals Intelligence Is an Important Resource

      5

      The private-sector information security world is continually following a path taken by the defense intelligence community decades ago. But where human intelligence bears the greatest fruit in their world, signals intelligence is the more fruitful resource in the private sector, where there is limited access to living people willing and able to provide information. Security analysts need these force multipliers to even stand a chance of being able to effectively cross-reference the vast number of security markers pouring out of their monitoring systems into a stream of directly actionable information that can keep pace with the opposition.

      6Engage Your Legal Counsel in the Process

      6

      Consult your company’s legal counsel early in the process before you are left cleaning up a data breach. Get advice about information sharing with existing business partners and public projects and let them advise you on the liability implications involved in doing so. Have a clear case to present to them about the levels of risk involved in sharing threat intelligence outside the organization, and most importantly, have them examine any formal agreement paperwork and author anything you issue in return. They are your experts; use that expertise.

      7Use Threat-Based, Not Risk-Based, Workflows

      7

      The primary driver of more information-sharing programs inevitably has to be the need for them, and a program that isn’t used is worse than none at all. On the other hand, an information-sharing program that is the key driver of daily security monitoring and investigation generates information in return and improves the value of the program for everyone. By focusing on who is getting an initial foothold on your infrastructure and comparing that information with others, attack responses can be prioritized based on a model of their intended goals and level of impending threat to your overall security.

      8Sharing Elicits Valuable Intelligence

      8

      The most critical piece of information leading up to any attack is how much knowledge of the attack the enemy possesses. Open information-sharing networks will be infiltrated by attackers, without a doubt. This should not be construed as a failure of the system if the system is robust enough to absorb it. Returning to the assertion that long-term success in information security is a matter of economics, the more time we can occupy the opponent in trying to find a staging location for their attacks that are already not publicly known, the more of his resources we waste.

      9All Data Holds Value

      9

      The more open an intelligence source, the more generic the format in which it must be communicated. Public sources of threat intelligence are published in the lowest-common denominator format-text files of IP address, comma-separated values (CSV) files and others. Many security organizations using these feeds process the information manually via analysts performing searches across logs.

      10Always Keep Moving Forward

      10

      Our attackers scour public knowledge for target information. Every press release gives some insight into activities and circumstances at the targeted organization; every LinkedIn profile contains a cornucopia of marks to infiltrate; every public mailing list posts another data point on what lies behind the firewall. When combined with directly acquired information from the target, detailed and directed plans of attack are easy to formulate, and attackers share their findings. Whatever the arguments for and against public information sharing on the defensive side, we can all agree that our own intelligence grid is still woefully inadequate.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×