Putting the X in X-Ops: Collaborating for Cybersecurity
The Evolution of Ops
Over the years, the field of operations in cybersecurity has evolved from DevOps to SecOps to DevSecOps. Now, a new player has entered the stage: X-Ops. In a recent podcast episode of Naked Security, cybersecurity expert Matt Holdcroft discusses the importance of getting all these “Ops” teams working together.
The Challenge of Connectivity
Previously, when computers were not connected to the internet, they were considered secure but rendered useless. Today, being online is crucial for systems to function and receive updates, but it also exposes them to cybersecurity risks. This creates a Catch-22 situation, as being secure and connected seem like conflicting goals.
The Changing Motivation for Malware
The motivation behind malware has shifted over the years. In the past, viruses were often created for fun or political reasons, infecting as many files as possible. Now, attackers aim to gain control of systems and may not even infect files during their attack. They leverage sysadmin tools and exploit existing vulnerabilities, often acquired through illegal means such as purchasing passwords.
Top Tips for Cybersecurity Operators
Matt Holdcroft shares three top tips for cybersecurity operators in today’s threat landscape:
1. Patching
Patching is vital, and it should be done promptly and regularly. Delaying patching significantly increases the risk of encountering breaking changes and leaves systems vulnerable to exploitation. Regular patching not only improves application security but also demonstrates to potential attackers that you are proactive in maintaining a secure environment.
2. Monitoring
Knowing your infrastructure and what is running on your machines is crucial for effective cybersecurity operations. Implementing tools and practices to monitor and measure the state of your systems allows for proactive identification of vulnerabilities and potential breaches. This includes having a software bill of materials (SBOM) to track and manage the dependencies and vulnerabilities within your codebase.
3. Kill/Cull
Regularly reassessing and retiring outdated or unnecessary systems is essential. Over time, systems accumulate outdated technologies and architectures that could pose security risks. Having a clear plan for system end-of-life and regularly evaluating the necessity of systems helps maintain a lean and secure infrastructure.
Advice for Driving Change
Implementing these recommendations may face resistance within organizations, particularly when dealing with developers and other stakeholders. To successfully drive change, cybersecurity teams should:
- Clearly communicate the benefits of maintaining security standards and the potential risks associated with ignoring them.
- Leads should not dictate but provide clear standards and explanations, emphasizing the advantages of prevention over remediation.
- Promote a culture of accountability and understanding of the impact of outdated technologies and software on security posture.
- Establish a proactive approach to vulnerability management by continuously monitoring, assessing, and improving systems and codebases.
Conclusion
Cybersecurity is an ongoing journey, and organizations must continuously adapt to stay ahead of evolving threats. Patching, monitoring, retiring outdated systems, and being nimble in embracing change are essential elements of an effective cybersecurity strategy. By implementing these practices, organizations can enhance their security posture and maintain a competitive advantage.
With each passing day, the cybersecurity landscape grows more complex and threats become increasingly sophisticated. It is crucial for organizations to invest in cybersecurity leadership and take a proactive stance in defending against potential breaches. By prioritizing collaboration and adopting a comprehensive approach to operations, organizations can navigate the ever-changing cybersecurity landscape with confidence.
Disclaimer: The views and opinions expressed in this article are those of the author and do not necessarily reflect the official policy or position of The New York Times.
<< photo by Chris Yang >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- Unraveling the Strategic Blueprint: Analyzing Russia’s Hybrid War in Ukraine
- Cyber Insurance: Leveraging Pen Testing to Mitigate Rising Costs
- Exploring the Weakness: Cisco Enterprise Switches Expose Encrypted Traffic
- Gomboc.ai: Pioneering Cloud Infrastructure Security for Startups
- The Growing Threat: Botnets Rapidly Exploit Published PoCs
- Shell Confronts Cybersecurity Crisis: Confirmed Breach and Data Leak by Ransomware Group
- The Growing Power Struggle: EU Court’s Impact on Meta’s German Data Case
- The Emerging Threat of Deepfake-based Sextortion Scams
- How to Outsmart Business Email Compromise Scammers in 6 Simple Steps
- Cybersecurity Experts Warn Not to Click on Links When Stressed
- Microsoft Teams Vulnerability: A New Tool Auto-Delivers Malware