[BreachExchange] Four strategies organisations are using to combat cyber attacks

Audrey McNeil audrey at riskbasedsecurity.com
Tue Mar 27 10:52:38 EDT 2018


http://www.itpro.co.uk/endpoint-security/30837/four-
strategies-organisations-are-using-to-combat-cyber-attacks

As cyber threats continue to grow in frequency and severity, traditional
approaches to security have become less effective. Newer technologies such
as layered and endpoint security are coming forward as important ways to
shore up defences and prevent headline-grabbing data leaks and ransomware
attacks.

But what are organisations doing to combat the growing number and
complexity of attacks? Here are four key strategies that are leading the
battle for cyber threat detection and prevention.

AI and machine learning

Everyone is talking about AI and machine learning, and it can be hard to
establish the practical applications around the buzz. Despite this, both AI
and machine learning are emerging as a leading technology in security, with
the potential to practically transform the landscape in the next few years.

Endpoint security technologies are beginning to use machine learning to
ensure that applications are running securely by monitoring deviations from
‘known good’ code activity.

Vendors are also incorporating artificial intelligence and machine learning
into their security products to identify patterns of behaviour that are
normal, as opposed to threatening.

Technical integration

Some of the competing technologies in the market are consolidating, which
will ultimately lead to more breadth and depth of protection from single
products, and therefore more effective security suites.

Prevention-focused tools such as anti-malware and application integrity
protection are beginning to pull in detection-focused capabilities such as
endpoint visibility and control, user behaviour monitoring and analytics.

Technical integration from consolidation can only be beneficial to
organisations looking to make their security tools easier to manage and
more effective in detecting and preventing attacks.

Merging existing and new technologies

They may be increasingly seen as outdated, but anti-malware, patch
management and secure configuration management are still widely adopted due
to legislation such as the Data Protection Act (and its incoming
replacement, GDPR) as well as industry regulations. Security buyers
complain that these technologies are ineffective against advanced attacks,
but are required nonetheless.

Merging old technologies with modern technologies such as machine learning
and artificial intelligence provides the benefits of security automation
and the prevention of new, unknown threats. Certainly when it comes to
cyber security, there’s no such thing as too much protection.

Flexible endpoint solutions

User and application behaviour monitoring have usually been performed in
isolation by separate technologies, but the two are beginning to integrate
in ways that are offering businesses more advanced insight into future
solutions.

With these integrations, and the continuous use of intelligent automation
via AI, future security suites will be able to automatically identify
malicious user and application behaviour and contain it without the
involvement of skilled security analysts.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20180327/a86598ea/attachment.html>


More information about the BreachExchange mailing list