Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • Why is it Safer to Use a Prebuilt Platform for your Website?
    • Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity
    • 10 Strategies to Stop Ransomware Attacks
    • Rajiv Kulkarni Talks about the Malware Analysis Pipeline
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 27, 2022

      Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 26, 2022

      10 Strategies to Stop Ransomware Attacks

      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 27, 2022

      Why is it Safer to Use a Prebuilt Platform for your Website?

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

    TechSpective
    You are at:Home»Business»On the virtues of Continuous Response

    On the virtues of Continuous Response

    0
    By TK Keanini on February 16, 2015 Business, Security, Security, Security Awareness, Threat Intelligence

    All one has to do is check their Twitter account to witness the constant stream of reported cyber security incidents happening globally. I explicitly say “reported” because individuals, supply chain partners, and businesses everywhere are at some point realizing they have been compromised and only a small percentage report this publicly. Often the only way through is the “hard way” so we can gain a better understanding of how to be more ready and more intelligent about this threat we all face.

    Information security practitioners have always said that security is not a thing, but a process. The term Incident Response (IR) is deeply engrained in our cyber security vocabulary at this point. Unfortunately it implies that a defender is simply in a reactive and weak position to the attacker.

    A new term has been adopted recently: Continuous Response. This is a different level of readiness that adapts to threats and never waits until the attacker has carried out their objective completely. Continuous Response is a pattern used in many other domains of conflict and I hope by the end of this article you will understand how Continuous Response can be applied to shape your security program to a higher level of agility and effectiveness.

    There are two analogies that illustrate the value of Continuous Response. Auto racing and the healthcare industry each discovered the importance of real-time monitoring and feedback. Both leverage telemetry data throughout the entire lifecycle of the “conflict” to provide a competitive advantage over rival race teams or a given health issue as the case may be.

    When Formula One racing began a race would start there was no opportunity for the driver to discuss tactics and strategy with his team until making a pit stop or the end of the race. These days, terabytes of information flow from the vehicle to be analyzed by the team in near real-time. The driver and crew chief are in constant communication throughout the race. The driver is in a continuous response loop with his/her environment and—because of this—has the intelligence required to make immediate decisions that impact his ability to win the race.

    The treatment of a disease like cancer is a situation where being proactive and early with detection dictates your chances of survival. Not long ago cancer detection was so late that the odds of survival for most types of cancer were miserably low. Today with early detection and treatment, once untreatable cancers are treatable and the survival rates are on the rise. Taking a continuous response to fitness, diet, and any signals from your body makes us more resilient to what used to be a grim situation.

    In Formula One racing, oncology healthcare practices, and in information security, the defender with a continuous response strategy can raise the cost of “attack” for their adversary just enough to win—or should we say not lose. Specifically in information security, the attacker must complete a series of operations without being detected while the defender only needs to detect the attack during any one of those phases so that the most appropriate action can be enacted.

    Preventing all attacks is an impossible objective. Detecting the attack early and directing them away from the business is your goal. You can achieve this if you have designed a network and security architecture that can deliver continuous telemetry. If you’re always paying attention for signs of suspicious or malicious activity you leave your opponent no place to hide and advance their campaign. This is the essence of Continuous Response.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSmartcuts vs. Shortcuts
    Next Article Testing the Windows 10 waters
    TK Keanini
    • Website

    TK Keanini brings nearly 25 years of network and security experience to the CTO role. He is responsible for leading Lancope’s evolution toward integrating security solutions with private and public cloud-based computing platforms. TK is also responsible for developing the blueprint and solution that will help Lancope’s customers securely benefit from the promise of software-defined networking (SDN). Prior to joining Lancope, Keanini served as CTO for nCircle, driving product innovation that defined the vulnerability management and configuration compliance market. Before joining nCircle, he served as Vice President of Network Services for Morgan Stanley Online, where he built and secured a highly available online trading system. Previously, Keanini was a systems engineer at Cisco, advising top financial institutions on the design and architecture of their data networking infrastructure. Keanini is a Certified Information Systems Security Professional (CISSP).

    Related Posts

    Why is it Safer to Use a Prebuilt Platform for your Website?

    10 Strategies to Stop Ransomware Attacks

    Rajiv Kulkarni Talks about the Malware Analysis Pipeline

    Comments are closed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 27, 2022

    Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Adobe
    Coffee and Politics
    Coffee and Politics
    Adobe
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    PopSpective

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.