Cyber resilience

Tue
01
Nov

Deception Technologies - A Hype or Field Ready Solution?

Deception Technologies - A Hype or Field Ready Solution?

It is important for security practitioners to have a clear understanding of current and emerging cyber threats to their enterprise. One of the tools available to them in their arsenal (but seldom used) is the deployment of honeypots as baits in their environment.
Honeypots as a security technology has been in existence from 2000, they were advances made on earlier solutions like a (chroot) jail as described in the 1991 path breaking paper by B Cheswick “An evening with berferd in which a cracker is lured, endured and studied”.
Honeypots however did not gain wide acceptance, as they did not yield commensurate benefits, being cumbersome to deploy and manage within an enterprise environment. On the other hand, they became excellent tools for researchers to study and observe the attackers.

Thu
20
Oct

Is Incident Management good enough to handle Cyber Crisis?

Is Incident Management good enough to handle Cyber Crisis?

Incident management, today is an integral part of security operations in any mature organization. Most organizations believe that they have implemented fairly decent* processes to handle cyber incidents.

The question, therefore, is why they then fail pretty miserably when faced with a cyber crisis. The answer is essentially pretty simple, a crisis is not the same as a high priority incident. This simple fact sometimes escapes the scrutiny of the planners.

Tue
14
Jul

Cyber Resilience - How Tata Consultancy Services Ltd is helping Global Customers though its Resilience journey

Cyber Resilience – How Tata Consultancy Services Ltd is helping Global Customers though its Resilience journey
What is Resilience?  It denotes both flexibility, strength. Webster’s defines Resilience as, 
The ability to bounce or spring back into shape, after being stretched.
I believe ‘Resilience’, in practice is to deal with analysis of inter-dependent systems to effectively manage complexity, deal with unpredicted events, identify workable ways to deal with rapid onset of stress and recover in short time. It’s also about self-organizing nature of systems, exposing systems to boundaries to probe its boundaries. It improves the ability to absorb, respond and recover from unpredicted events or emergencies towards building a better prepared resilient infrastructure.  Resilience follows an adaptive cycle and systems keep moving in a Fore loop of slow accumulation or Back loop of fast and chaotic creative destruction as depicted in the figure (Wilkinson, 2015). 
 
Thu
18
Jun

Approaches to cyber risk mitigation

Approaches to cyber risk mitigation

Risk management focuses on realizing security through the management and control of known risks. The rapid evolution risks is outpacing. Today, Cyber resilience requires organizations to prepare to deal with severe impacts from cyber threats that are impossible to predict. Cyber resilience requires that enterprises have the ability to prevent, detect and respond quickly and effectively, in order to manage, respond and mitigate negative impacts of breach. It is about sustaining the success of an enterprise, even when it has been subjected to the almost inescapable attack. It puts the power in the hands of people, and arms them with the ability to recognize risks, draw on the collective intelligence of others, and take preventive or corrective action.

Pages

Subscribe to RSS - Cyber resilience