Printer Friendly

Corporate boards 'must set security standards'.

It's time for corporate boards to take a role in setting security priorities and expectations, a report said, highlighting a set of security principals as a foundation to respond to the cyber security challenges of today's world.

Cyber attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, explained the Cisco 2015 Annual Security Report released today (February 1).

It examines both threat intelligence and cyber security trends, reveals that organizations must adopt an 'all hands on deck' approach to defend against cyber attacks.

The report findings conclude that it's time for corporate boards to take a role in setting security priorities and expectations. Cisco's "Security Manifesto", a formal set of security principals as a foundation to achieving security, can help corporate boards, security teams and the users in the organization, to better understand and respond to the cyber security challenges of today's world.

It can serve as a baseline for organizations as they strive to become more dynamic in their approach to security and more adaptive and innovative than adversaries. The principals are:

1. Security must support the business.

2. Security must work with existing architecture - and be usable.

3. Security must be transparent and informative.

4. Security must enable visibility and appropriate action.

5. Security must be viewed as a "people problem."


Online criminals are expanding their tactics and morphing their messages to carry out cyber-attack campaigns and make it harder to detect them. The top three trends that Cisco's threat intelligence uncovered are:

* Snowshoe spam: Emerging as a preferred strike method, attackers are sending low volumes of spam from a large set of IP addresses to avoid detection.

* Web Exploits Hiding in Plain Site: Widely used exploit kits are getting dismantled by security companies in short order. As a result online criminals are using other less common kits to successfully carry out their tactics - a sustainable business model as it does not attract too much attention.

* Malicious Combinations: Flash and JavaScript have historically been insecure on their own, but with advances in security, attackers are combining the weakest of the two parts. Flash malware can now interact with JavaScript to hide malicious activity by sharing an exploit between two different files: one Flash, one JavaScript. This type of blended attack is very hard to detect.


Users are caught in the middle. Not only are they the targets, but end-users are unknowingly aiding cyber attacks. Throughout 2014, Cisco threat intelligence research revealed that attackers have increasingly shifted their focus from servers and operating systems as more users are downloading from compromised sites leading to a 280 per cent increase in Silverlight attacks along with a 250 per cent increase in spam and malvertising exploits.


Results from Cisco's Security Benchmark Study, which surveyed Chief Information Security Officers (CISO's) and Security Operations executives at 1700 companies globally reveals a widening gap in defender intent and actions. Specifically, the study indicates that 75 percent of CISOs see their security tools as very or extremely effective.

However, less than 50 percent of respondents use standard tools such as patching and configuration to help prevent security breaches and ensure that they are running the latest versions. Heartbleed was landmark vulnerability last year, yet 56 per cent of all OpenSSL versions are over 4.5 years old. That is a strong indicator that security teams are not patching.

While many defenders believe their security processes are optimized-and their security tools are effective-in truth, their security readiness likely needs improvement.

"Security is now the responsibility of everyone within an organization, from the board room to individual users," said Rabih Dabboussi, managing director, Cisco UAE.

"Security leaders and practitioners need the support of the entire business to combat malicious actors who are increasing in their proficiencies to exploit weakness and hide their attacks in plain sight.

"To protect organizations against attacks across the attack continuum, CISOs need to ensure that their teams have the right tools and visibility to create a strategic security posture, as well as educate users to aid in their own safety and the safety of the business," he added.

"Attackers have become more proficient at taking advantage of security gaps. At any given time, we should expect for one per cent of high-urgency vulnerabilities to be actively exploited while 56 percent of all OpenSSL versions are still vulnerable to Heartbleed," Dabboussi continued.

"Despite this, we see less than half of the security teams surveyed using standard tools like patching and configuration management to help prevent security breaches. Even with leading security technology, excellence in process is required to protect organizations and users from increasingly sophisticated attacks and campaigns," he concluded. - TradeArabia News Service

[euro]o Copyright 2014

Copyright 2014 Al Hilal Publishing and Marketing Group Provided by SyndiGate Media Inc. ( ).
COPYRIGHT 2015 SyndiGate Media Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2015 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:TradeArabia (Manama, Bahrain)
Date:Feb 1, 2015
Previous Article:M[euro]uA[micro]venpick Bahrain wins sustainability award.
Next Article:Karcher opens Qatar centre in GCC expansion.

Terms of use | Privacy policy | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters