Palestinians uncertain as FIFA, UEFA step in to save soccer pitch from Israeli demolition    House panel votes to hold Clintons in contempt in Epstein probe    Trump backs off tariffs threat, says Greenland deal framework reached    Saudi Arabia signs agreement with World Economic Forum to accelerate industrial transformation    Over 78 million faithful visit Two Holy Mosques in a month    Saudi FM meets British, French counterparts in Davos    Northern Saudi cities record coldest temperatures of winter as mercury drops to –3°C    Arab coalition condemns deadly attack on Giants Brigades commander in Yemen    Sha'ban crescent sighted Tuesday    Saudi POS transactions reach 236 million, SR4bn in one week    Al-Khateeb highlights Saudi-UN partnership to shape quality of life in future cities    122 million tourists spend SR300 billion in Saudi Arabia in 2025    Italian fashion legend Valentino dies at 93    Saudi orchestra brings 'Marvels of Saudi Orchestra' to AlUla with 107 musicians    Katy Perry makes Saudi debut at Joy Awards, praises Saudi design and hospitality    Hail wins Guinness World Record with largest off-road production cars convoy    SFDA approves registration of 'Anktiva' for treatment of bladder and lung cancer    Saudi Darts Masters 2026 to offer record $200,000 prize for nine-dart finish    Al Taawoun condemn "repeated refereeing injustice" after late penalty defeat    British boxer Anthony Joshua discharged from hospital after Nigeria car crash    The key to happiness    Sholay: Bollywood epic roars back to big screen after 50 years with new ending    Ministry launches online booking for slaughterhouses on eve of Eid Al-Adha    Shah Rukh Khan makes Met Gala debut in Sabyasachi    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Businesses in Kingdom need holistic tactics to avert threats
Published in The Saudi Gazette on 14 - 04 - 2016

In today's world where every business is always on and (close to) everything is always connected, there is no silver bullet when it comes to securing organizations' critical assets. To shorten response times and contain the largest number of threats possible, organizations in Saudi Arabia, need a holistic security approach that addresses the entire threat defense lifecycle, seamlessly integrates and offers a truly connected approach to putting actionable threat information and control at the fingertips of security management teams — all with the fastest available performance to enable the organization to take action in real time.
Attackers today use multiple techniques to penetrate an organizations' infrastructure and compromise their vital data assets or systems. This problem has only been exasperated with the proliferation of the cloud and IoT and today's targeted multiphase attacks consist of a series of steps that make up the cyberattack chain: reconnaissance, scanning for vulnerabilities, exploitation, and, finally, exfiltration of valuable corporate data.
As attacks grow in complexity, precision, and volume, yesterday's approach to Threat Intelligence (TI) is no longer adequate. Investigating targeted attacks is no easy task. The dynamic behavior of the attackers, the greater variety and availability of local and global threat intelligence sources, and the diversity of TI data formats can make the aggregation and digestion of threat intelligence into security operations center (SOC) tools more challenging than ever before.
A mixed-vendor environment, which is typical of most enterprises, adds to the difficulty of sharing event data and promoting event visibility throughout the organization. As Gartner points out in its report, Technology Overview for Threat Intelligence Platforms, "An organization's inability to share TI is an advantage to cyber threat actors. TI sharing is a force multiplier and is becoming a key element in keeping up with the increasing number of threat actors and the attacks they use".
Sharing threat intelligence alone will not necessarily result in sustainable corrective action and prevention. Security analysts can quickly become overwhelmed with too much information. Most security teams are engaged in an exhausting manual process of analyzing millions of security events and suspicious files in an effort to piece together a mountain of data and try to reconstruct the targeted attack. Ultimately, this impairs the thoroughness and speed of the response process. With a less-than-complete comprehension of threats, security teams are struggling to contain attacks in a timely manner.
These challenges result from insufficient integration between inspection, intelligence gathering, analytics, and enforcement elements of the security architecture. Silos of data and point controls complicate operations and increase risk. For example, the data each control generates and the context of each situation are poorly captured and seldom shared. A firewall may block a payload coming from an untrusted domain because it knows about communications, not malware. It will permit that payload coming through a trusted domain. Similarly, anti-malware could block unknown payloads received from known bad addresses if it knows to think beyond the payload or look within the payload to consider IP addresses.
Unintegrated security functions like these keep organizations in a firefighting mode, always reacting and pouring human resources into each breach. Process inefficiency exhausts scarce investigative resources and lengthens the timeline in which data and networks are exposed to determined attackers. These islands of security products, data sets, and operations give sophisticated attackers ample space and white noise in which to enter, hide, and persist within the targeted organization.
Integration improves effectiveness, as active sharing of data and accelerated cross-control processes make it practical and possible for every security control to leverage the strengths and experiences of the others around it. It is an adaptive threat prevention model that is quickly replacing traditional, unintegrated architectures as security teams work to achieve sustainable advantage against complex threats.
Rather than treating each malware interaction as a stand-alone event, an adaptive threat prevention model integrates processes and data through an efficient messaging layer. This provides reinforced levels of inspection and analysis informed by expanded forms of intelligence and connects end-to-end components to generate and consume as much actionable intelligence as possible from each contact and process.
The shift to adaptive threat prevention helps overcome the all-too-common functional fences that shackle detection, response, and any chance of improved prevention. — SG


Clic here to read the story from its source.