Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: Internet Storm Center - Internet Security | DShield Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

Re-evaluating Network Security - It is Increasingly More Complex

Published: 2019-07-20
Last Updated: 2019-07-20 20:34:20 UTC
by Guy Bruneau (Version: 1)
0 comment(s)

I saw an interesting report [1] this week released last month (June 2019) by the Enterprise Strategy Group (ESG) about the increase complexity dealing with network security. The report highlights these three things:

  • Increase in the past 2 years where network security is more complex and challenging (83% of those survey agree)
  • Business difficulty keeping up with network security (i.e. wrong network security, process and controls)
  • Looking for new types of network security that includes consolidation and architecture featuring centralizing management

The report identified three main factors related to the increase in network security complexity. The attack surface and the workload are both growing and the threats and vulnerabilities are more complex to identify and deal with. The security team has to keep up with more devices that add complexity to a network (IoT, tablets, phones, laptops, cloud computing, etc) that are now widely integrated to the enterprise. Complex security events can lead to short or extended network outages, application or network availability, loss of proprietary data and/or productivity.

In The Need for Change section, the report highlight the following priorities: "[...] the biggest factors driving network security include preventing/detecting malware threats (47%), regulatory compliance (42%), support for cloud computing initiatives (38%), and the need for network security to be more scalable to support dynamic business processes and new business initiatives (34%)."[1]

What keeps you up at night? Are your priorities similar to those identified in this report?

[1] https://www.cisco.com/c/dam/en/us/products/collateral/security/defense-orchestrator/esg-research-insights-report.pdf

-----------
Guy Bruneau IPSS Inc.
My Handler Page
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

0 comment(s)

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Malicious PHP Script Back on Stage?
Jul 19th 2019
2 days ago by Xme (0 comments)

The Other Side of Critical Control 1: 802.1x Wired Network Access Controls
Jul 18th 2019
2 days ago by Rob VandenBrink (0 comments)

Analyzis of DNS TXT Records
Jul 17th 2019
4 days ago by Xme (0 comments)

Commando VM: The Complete Mandiant Offensive VM
Jul 16th 2019
5 days ago by Russ McRee (0 comments)

isodump.py and Malicious ISO Files
Jul 15th 2019
5 days ago by DidierStevens (0 comments)

View All Diaries →

Latest Discussions

Worth protecting my website?
created Jun 28th 2019
3 weeks ago by Anonymous (3 replies)

Email Encryption Providers
created Jun 27th 2019
3 weeks ago by Anonymous (2 replies)

Entrust resolving to CNAME that is an invalid CDN host
created Jun 10th 2019
1 month ago by jauntysankey (0 replies)

Outlook Forms (forms.outlook.com)
created May 31st 2019
1 month ago by MasterYoshi (0 replies)

McAfee - Trenmicro - Symantec Breached by Fxmsp hackers
created May 14th 2019
2 months ago by DrGreen (0 replies)

View All Forums →

Latest News

View All News →

Top Diaries

Wide-scale Petya variant ransomware attack noted
Jun 27th 2017
2 years ago by Brad (0 comments)

Using a Raspberry Pi honeypot to contribute data to DShield/ISC
Aug 3rd 2017
1 year ago by Johannes (0 comments)

Second Google Chrome Extension Banker Malware in Two Weeks
Aug 29th 2017
1 year ago by Renato (0 comments)

Detection Lab: Visibility & Introspection for Defenders
Dec 15th 2017
1 year ago by Russ McRee (0 comments)

Maldoc with auto-updated link
Aug 17th 2017
1 year ago by Xme (0 comments)