海角大神

Modern field guide to security and privacy

Defeating cybersecurity's emerging threats with threat intelligence

With hackers lurking on your network for more than seven months on average, companies need to better work on keeping threats out in the first place -- and to do that, they need threat intelligence, said AlertLogic's Chief Security Evangelist Stephen Coty at a Passcode event on the sidelines of South by Southwest on Monday.

If the average hacker made their way into your network on聽January 1st, you wouldn't be aware they were inside until well into July.聽

While traditional defensive cybersecurity is important, the fact that hackers can linger for an average of 229 days聽means companies need to think more directly about surveying the threat landscape, argued Stephen Coty, chief security evangelist for AlertLogic, at a Passcode event on the sidelines of South by Southwest聽on Monday.

"We talk about always being on the defensive," Mr. Coty said. "I'm a big believer of being on the offensive," of taking a proactive posture against cyber threats.

How to do that? Threat intelligence.聽

"Threat intelligence is really the key to finding out what's out there. How do we enlist black hat hackers, gray hat hackers, to come on our side," Coty 蝉补颈诲.听

Once inside communities of nefarious actors, Coty said that cyber defenders can "start going out there and finding out what are the new vulnerabilities, infiltrating these hacking groups, finding out what's the next target.

"What's at stake?

By stealing your research and your development, your competitors can leapfrog years ahead and get to market before the originator of good ideas can even make a move, Coty explained.聽And closer to home, the impacts of data breaches could also have major impacts on children.聽When a child's identity is stolen online, "what's going to happen? Nobody is going to find out that a kid's credit is affected until they apply for a credit card at 18. And that's when you find out you're $10,000 in debt because of credit card bills because people have gotten that information [illegally online]," Coty said. "That is a huge concern.

"Even with good threat intelligence, however, companies still need technological investment. A preponderance of devices -- from point-of-sale terminals at major American retailers to airport Transportation Safety Administration scanners to the systems governing America's power networks and other major infrastructure -- are still running out-moded and insecure software, Coty pointed out. 聽

Watch the video of Coty's full remarks at the top of this post and follow him on Twitter at . You can follow AlertLogic .

Stephen Coty is the Director of Threat Research at Alert Logic in Houston TX and a member of ISSA, Infragard and the HTCIA. Before coming to Alert Logic, he was the Manager of Cyber Security for Rackspace Hosting. Prior to Rackspace, he has worked at several companies including Wells Fargo Bank, Applied Materials, Stanford Medical Center and The Netigy Corporation. He has been in the Information Technology field since 1992 with a Focus on Security as of 1999 where he started as a penetration tester and auditor. Research has been his primary focus since 2007.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to Defeating cybersecurity's emerging threats with threat intelligence
Read this article in
/World/Passcode/2015/0318/Defeating-cybersecurity-s-emerging-threats-with-threat-intelligence
QR Code to Subscription page
Start your subscription today
/subscribe