Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
15 Schools Hit By Cyberattack In Nottinghamshire
Qualys Hit With Ransomware And Customer Invoices Leaked
Experts Reaction On PrismHR Hit By Ransomware Attack
Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is...
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Yael Macias
Product Marketing Managerfeature_status*/ ?>
Hunters

Comments Dotted : 1
December 01, 2020

Expert Insight: 5 Key Takeaways From ESG’s Report: The Impact Of XDR In The Modern SOC

The hybrid IT environments within organizations and the disconnected point solutions lead to siloed detection as well.
For the busy security professional like yourself, here are five insightful takeaways from the report you should know about: 1. Automation Can Fasten Detection and Response: Detection and response has been a slow, siloed process so far. Besides the intrinsic problem that this entails from a cybersecurity perspective – attackers’ dwell time is too long – SOC efficiency is not optimized and business agility is lacking. Setting a new standard for decision-making and improving mean time to .....Read More
For the busy security professional like yourself, here are five insightful takeaways from the report you should know about: 1. Automation Can Fasten Detection and Response: Detection and response has been a slow, siloed process so far. Besides the intrinsic problem that this entails from a cybersecurity perspective – attackers’ dwell time is too long – SOC efficiency is not optimized and business agility is lacking. Setting a new standard for decision-making and improving mean time to respond to threats (MTTR) can be enormously facilitated by adding automation to the picture. Automation can free up time from analysts to focus only on real attacks and reduce dependency on highly skilled analysts for time-consuming tasks that can be automated, according to 33% of organizations. Moreover, 42% of respondents believe that getting a simplified, 360 degree view of the entire attack can significantly speed up detection and response. 2. Managing and Analyzing Massive Amounts of Data is a Challenge: Security products generate a tremendous volume of data spanning across many different, typically disconnected sources such as EDR, firewall, threat intelligence, e-mail, web proxy logs, and other telemetry sources. This leads to an overwhelming quantity of security alerts which prevent analysts from filtering the real ones from the noise. As a result, it is hard to act upon the existing data since, once the analyst has succeeded to process and stitch it all together, it’s probably all too late. That’s why 40% of respondents believe they can be more effective if they have a pipeline that allows them to ingest real-time security data and analyze attacks across multiple security controls. 3. Detection of Complex Attacks is a Priority for Security Teams: The hybrid IT environments within organizations and the disconnected point solutions lead to siloed detection as well. This is particularly true for the cloud, where organizations claim to have less and less visibility all the time with the migration to cloud-based workloads and SaaS applications, and suspect that attacks are missed due to these blind spots. The lack of expertise and the necessary tools to correlate data across different sources often leads to the reactive elimination of point threats without understanding the broader campaign. Without interconnecting data sources, single-sensor security solutions are most likely going to miss advanced threats, especially those that move laterally in the corporate network. Not surprisingly, organizations believe that deploying an XDR solution that can deliver advanced analytics and is capable of correlating signals from various sources, can help them detect, identify and understand complex attacks across the entire cyber kill chain. It is worth noting that 39% of respondents would prioritize adding more comprehensive analytics capable of recognizing complex attacks by processing signals across multiple security controls. 4. The SIEM (by itself) is Not the Right Tool for the Job: According to the survey, SIEMs are among the three key most valuable security tools, and yet there is also a consensus on the fact that these solutions are very costly, especially when used as a detection tool since it requires feeding them with too much data, and the correlation and analysis fall under the analyst’s responsibility. SIEMs are also complex and resource-consuming to maintain and manage: they just require too much heavy lifting. Moreover, while most agree that it serves well for detecting known threats, when it comes to detecting unknown ones it is simply not enough according to 30% of organizations (and we all know that attackers typically don’t use signature-based malware to breach a corporate network). 5. Managed Services Are a Good Companion: An important takeaway from the report is that organizations are looking to enhance their security teams or simply externalize the management of their detection and response to MDR services, with 73% of organizations either already using an MDR provider or actively working on a project to adopt it. Whether it’s to overcome a skill shortage or to augment their existing skills and capacity, security professionals are looking for hands-on help with their detection and response operations and are in most cases looking at their MSSP or security partner to handle them. With these takeaways in mind, it is not surprising to see that XDR adoption is moving fast. Organizations need powerful data processing and analytics, security automation, the ability to detect complex threats where tools like SIEM are not delivering, and having the right partner to provide them with MDR services. The promise is that, with XDR modernizing the SOC by creating a new standard for decision making, analysts are finally empowered with a tool they can rely on.  Read Less
Like(5)  (0)

Linkedin Message

@Yael Macias, Product Marketing Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The hybrid IT environments within organizations and the disconnected point solutions lead to siloed detection as well...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-insight-5-key-takeaways-from-esgs-report-the-impact-of-xdr-in-the-modern-soc

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Yael Macias, Product Marketing Manager, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The hybrid IT environments within organizations and the disconnected point solutions lead to siloed detection as well...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-insight-5-key-takeaways-from-esgs-report-the-impact-of-xdr-in-the-modern-soc

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Stephen Kapp, CTO and Founder, Cortex Insight

"Updating and patching systems should be a priority for schools and mandatory for their pupils. "

15 Schools Hit By Cyberattack In Nottinghamshire

Jake Moore, Cybersecurity Specialist, ESET

"In general, malicious actors now use full-blown extortion tactics to make sure they get what they came for in attacks like this. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Ilia Kolochenko, CEO, ImmuniWeb

"Qualys’s response to the incident is a laudable example of transparent and professional handling of a security incident. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Due to the nature of this organisation, PrismHR makes for an extremely valuable target to an adversary looking to extract sensitive information. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Lewis Jones, Threat Intelligence Analyst, Talion

"Ransomware renders any files it touches unreadable unless, and until, a victim pays for a digital key needed to unlock the encryption on them. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Stephen Kapp, CTO and Founder, Cortex Insight

"An attack like this will not only impact PrismHR but also its customers who will need access to systems in order to pay employees. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Richard Walters, CTO , Censornet

"“Careless clicks sink ships.” "

Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is Back And Stronger Than Ever

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel