{"id":836,"date":"2016-02-11T17:16:58","date_gmt":"2016-02-11T17:16:58","guid":{"rendered":"http:\/\/54.201.249.27\/?p=836"},"modified":"2016-02-11T17:16:58","modified_gmt":"2016-02-11T17:16:58","slug":"tripwire-it-professionals-overconfident-in-their-ability-to-detect-breaches-reveals-survey","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/tripwire-it-professionals-overconfident-in-their-ability-to-detect-breaches-reveals-survey\/","title":{"rendered":"Tripwire: IT Professionals Overconfident in Their Ability to Detect Breaches, Reveals Survey"},"content":{"rendered":"

Tripwire: IT Professionals Overconfident in Their Ability to Detect Breaches, Reveals Survey<\/h1>\n

In today\u2019s ever-evolving world, the PC is no longer the sole endpoint found on organizations\u2019 networks. It is joined by the likes of servers and point-of-sale terminals (PoS), endpoint devices which are contributing to a growing complexity of modern IT environments. Such change demands that IT professionals rethink their organizations\u2019 endpoint security strategies.<\/p>\n

This necessity has not been lost on\u00a0Eric Ogren<\/a>, Senior Security Analyst at 451 Research.<\/p>\n

\u201cIf you gave 100 people a blank slate and asked them to design an endpoint security plan, how many would think of trying to identify and block all known threats?,\u201d asks Ogren in a recent\u00a0post<\/a>\u00a0for Tripwire. \u201cYou probably wouldn\u2019t start there, and you probably recognize that a perimeter is just a concept. You might start by observing what defines a normal configuration for each user so you can recognize sudden unexpected changes and have a reference point to return to normal.\u201d<\/p><\/blockquote>\n

The ability to detect configuration changes is crucial for spotting breaches and targeted attacks. It is therefore not surprising that many organizations have invested in automated tools and vulnerability scanners capable of detecting alterations. What is surprising, however, is the fact that most IT professionals are confident these solutions can detect a configuration change in a short period of time despite not knowing enough about the tools\u2019 actual detection rates.<\/p>\n

This is the overall finding of an extensive\u00a0study<\/a>\u00a0recently conducted by Dimensional Research on behalf of Tripwire. The survey evaluated the confidence of 763 IT professionals from retail, energy, financial services, and public sector organizations in the United States regarding the efficacy of seven key security controls that must be in place to quickly detect a cyber attack in progress.<\/p>\n

Those seven controls, which include PCI DSS, SOX, NERC CIP, MAS TRM, NIST 800-53 and IRS 1075, recommend accurate hardware inventory, accurate software inventory, continuous configuration management and hardening, comprehensive vulnerability management, patch management, log management, and identity and access management as parts of an ongoing endpoint security strategy.<\/p>\n

When asked if they know how long it takes for their automated tools to alert the organization about an authorized configuration change on an endpoint device, a majority (60 percent) of respondents stated that they had only a vague idea, no idea, or did not use those kinds of solutions to discover configuration alterations. This figure is approximately the same (62 percent) as the percentage of those who are unsure about the alerts generated by vulnerability scanning systems.<\/p>\n

However, when they were asked about how long it takes for those tools to detect a configuration change, most respondents said that it would take only minutes or hours for automated tools and vulnerability scanning systems to detect such changes (71 percent and 87 percent, respectively). In reality, it usually takes months for security professionals to detect an advanced persistent threat or targeted attack on their network, as revealed by\u00a0Mandiant\u2019s M-Trends 2015 report<\/a>\u00a0and Verizon\u2019s\u00a02015 Data Breach Investigations Report<\/a>.<\/p>\n

Along those lines, nearly half (48 percent) of respondents working for federal government organizations said not all detected vulnerabilities are remediated within 15 to 30 days.<\/p>\n

Additionally, only 23 percent of the IT professionals surveyed said that 90 percent of the hardware assets on their organizations\u2019 networks are automatically discovered.<\/p>\n","protected":false},"excerpt":{"rendered":"

In today\u2019s ever-evolving world, the PC is no longer the sole endpoint found on organizations\u2019 networks. It is joined by the likes of servers and point-of-sale terminals (PoS), endpoint devices which are contributing to a growing complexity of modern IT environments. Such change demands that IT professionals rethink their organizations\u2019 endpoint security strategies.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,10],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/836"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=836"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/836\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}