The Explosion of Apps: 27% are Risky Q CLOUD CYBERSECURITY REPORT
|
|
- Lily Young
- 7 years ago
- Views:
Transcription
1 The Explosion of Apps: 27% are Risky Q CLOUD CYBERSECURITY REPORT
2 Introduction Traditionally, Shadow IT refers to any application employees utilize without IT approval. And with nearly infinite apps at their disposal, Shadow IT is expanding exponentially. However, as more and more organizations adopt cloud platforms, new Shadow IT risk vectors are coming into play in the form of connected third-party apps. These apps are authorized using corporate credentials, demand extensive permission sets, and communicate with corporate SaaS platforms via OAuth connections. An organization may embrace its employees shadow exploration of innovative technology solutions and sanction a subset of these apps as Productivity IT. But it s important to closely monitor the connected third-party apps, as authorizing them gives them programmatic (API) access to corporate data on multiple Saas platforms. Because these apps (and by extension, their vendors) are able to view, delete, externalize and store corporate data, a malicious individual leveraging these connections can act on behalf of users to access, exfiltrate, and externalize data. With 22% more breaches from January to May of 2016 than during the same time period in 2015 (source: 24/7 Wall St), connected third-party apps must be managed carefully. Uncovering nearly 160,000 unique third-party applications across 10 million end users, CloudLock s report will share critical data to help organizations understand the implications of this trend. The shift to the cloud creates a new, virtual security perimeter that includes third-party apps granted access to corporate systems. Today, most employees leverage a wide variety of apps to get their jobs done efficiently, unwittingly exposing corporate data and systems to malware and the possibility of data theft. Ayse Kaya-Firat Director of Customer Insights & Analytics, CloudLock Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 01
3 Key Findings Third-party apps have increased 30x over the last two years. It is more important than ever to understand how apps are connecting to corporate environments, whose credentials are being leveraged, and what security implications they may have. 27% of third-party apps connected to corporate environments are high risk. Measuring risk by the combination of access scopes, community-sourced ratings, and expert-driven analytics, 27% of third-party apps are more likely to open potential pathways into your organization for cybercriminals. Over 1/2 of third-party apps are banned due to security-related concerns. While apps can be banned for any number of reasons, including concerns around productivity, a clear majority are banned because of the security vulnerabilities they introduce. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 02
4 The Explosion of Third-Party Apps In the traditional notion of Shadow IT, there is a missed dimension: whether or not apps are connected to corporate environments. There s a new way that third-party apps can pose risks to your organization: OAuth connections. OAuth connections allow apps to act on behalf of users, which can be useful but is also dangerous when enabled using corporate credentials. Managing the potential risks associated with connected third-party apps means identifying those that pose the highest risk, and mitigating accordingly. The shadow IT dilemma is only becoming more challenging as usage is increasing exponentially year over year. From 2014 to 2016, we ve seen nearly a 30x increase in apps from 5,500 to 156,796 Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 03
5 OAuth-Connected Apps Have Extensive Access to Corporate Environments Third-party apps authorized via OAuth-connections have extensive - and at times excessive - access scopes. Because they can view, delete, externalize, and store corporate data, and even act on behalf of users, they must be managed carefully. Below is an example of what a third-party app s request for permissions may look like: Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 04
6 19% Increase in Third-Party Apps in Just the last 3 months Meanwhile, the number of third-party application installations has increased 11x since This means not only is the variety of applications increasing, but the usage of these apps is increasing as well. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 05
7 Tech, Media, and Education are the Largest Consumers of Third-Party Apps On average, an organization s users connect 733 third-party apps to the corporate environment. As shown above on the left hand side, Retail and Manufacturing lead with well above the average, not surprising given that the average organization size is larger in these industries. But, when normalized by organization size (as shown on the right), we find that the real outliers are Tech, Media, and Educational institutions. In these industries with more tech-savvy users, applications are abundant and increasing in use at faster rates. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 06
8 Apps and Installs Per Organization Up 600% in Two Years When taking a closer look into third-party apps at the organization level, there are similar trends. Over the past two years, the number of apps per average organization has increased from 130 to 733. There are even organizations with more than 18,500 applications, all with the potential to become backdoors through which hackers can easily infiltrate their environments. Currently, the average organization has 733 third-party apps and more than 7,500 total installs. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 07
9 27% of Apps Are Risky Defining Risk On a daily basis, employees are utilizing apps without notifying IT, and authorizing OAuth connections through their corporate credentials. If these apps are malicious by design, or the connected application s vendor is compromised, this opens the door to cybercriminals deleting accounts, externalizing or transferring information, provisioning and deprovisioning users, changing users passwords, modifying administrator s settings, performing log searches, and more. CloudLock s Cloud Application Risk Index (CARI) evaluates risk across three dimensions - access scopes, community trust ratings, and application threat intelligence - to assign a well-rounded application risk value and help security teams make informed decisions on which apps are trustworthy and which should be monitored, banned and revoked. Taking into account both static attributes (e.g. past breaches, security certifications, etc.) and dynamic ones (e.g. community sourced intelligence), CARI is the first risk index that aims to map and measure cloud-to-cloud risk. Across CloudLock s entire app catalog of 156,000 unique apps, the average CARI value is Ideally, this score would be zero, so organizations need to focus on implementing plans to mitigate risks posed by third-party apps. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 08
10 Cloud Application Risk Index (CARI) CARI Data Access Requirements Community Trust Rating Application Cyber- Threat Intelligence DIMENSIONS Data Access Permissions Granted Peer-Driven, Crowd-Sourced Evaluations Research-Based Vulnerability Ratings SPECIFIC INDICATORS Risk calculation based on permissions required to Trust ratings by 750 corporate security teams for Comprehensive background check run authorize an app over 20,000 unique apps by CloudLock s cybersecurity Granting data access to an app gives it programmatic (API) access to corporate SaaS platforms via OAuth connections Classifications in combination with the organization size impact the reputation score of an app experts based on a variety of security attributes for an app, such as: Past breaches The app (and by extension, the vendor) is able to act on behalf of the user (the CEO, CFO, superadmin, etc.) and can view, store, delete, externalize corporate data and identity-related Ratings are segmented by industry and geography as well as classification reason More reliable than vendor based risk ratings Security Certifications Analyst Reviews App Category Multifactor Authentication, etc. information. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 09
11 27% of Third-Party Apps Classified as High-Risk In some ways, a connected application s risk level is in the eye of the beholder, and any application can become risky in the right (or wrong) circumstances. Of all the apps granted access to corporate systems in 2016, 27% were classified as high risk by security teams. Using CARI, security teams can gain an understanding of what applications users are authorizing and formulate actionable strategies around which ones should be banned, trusted, or automatically revoked due to their risk level. Percent of Installs by Risk 15% 27% LOW RISK 58% MEDIUM RISK 156,796 THIRD-PARTY APPS HIGH RISK Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 10
12 No Industry is Immune Overwhelming Majority of Third-Party Apps are Medium to High Risk Interestingly, no matter what the organization size, all industries and regions tend to have a relatively even distribution of low, medium, and high risk applications. The percentage of risky apps is slightly higher in financial institutions, which is surprising given their strict compliance regulations and high levels of oversight in IT over information sharing. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 11
13 All Regions Are at Risk Regulations Cannot Mitigate All Risk Our hypothesis was that due to stricter compliance regulations, European organizations would have a lower percentage of high risk apps. But it turns out that s not the case. Corporations in the EMEA region (Europe, the Middle East, and Africa) actually have a slightly higher concentration of risky apps compared to North America. This goes to show compliance regulations need to be taken beyond data and applied to applications as well. Regulations clearly are not the answer to mitigating all risk. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 12
14 Top 10 Risky Apps To identify the top risky applications, we zero in on the top installed apps rated as such. It s important to note that apps on this list do not have to be risky by nature. But, when authorized by a high number of privileged users, and/or when they require excessive access into corporate environments with no legitimate business case, these applications could be detrimental if compromised. Malicious users who compromise such risky apps can act on behalf of users and put expose sensitive data. Clash Royale Goobric Web App My Talking Tom Evermusic Music Player Pingboard 8 ball pool Gunslugs 2 ZigZag Fruit Ninja Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 13
15 Over Half of Third-Party Apps Banned due to Security Concerns While enterprise SaaS vendors typically offer a marketplace of third-party applications that have been vetted and undergone security reviews, users have no shortage of additional means of enabling third-party apps, raising issues around trustworthiness and security. Over half of third-party apps assessed in 2016 are banned due to security-related concerns, with security professionals citing excessive access scopes in 24% of bans, and subpar vendor trustworthiness (applications of questionable origin or intent) in 19% of bans. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 14
16 WhatsApp Messenger Zoho Accounts TOP 10 BANNED APPS SoundCloud Sunrise Calendar In order to run a secure enterprise, potentially dangerous third-party apps need to be managed carefully. Employees can still leverage these apps using their personal credentials, but if they violate internal policies, require excessive access, come from a vendor that is not deemed trustworthy, or have overlapping functionality with a more secure and widely used app, organizations may ban them from being used. These are the apps most commonly banned by organizations. Power Tools Free Rider HD Madden NFL Mobile Pinterest Airbnb Code Combat Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 15
17 Slack Linkedin TRUSTED APPS Most businesses require an Application Use Policy and a legitimate business case to approve the usage of third party apps that connect to corporate systems. Security teams carefully evaluate risk levels and approve the use of apps that increase productivity, are required for work, or have proven to be a useful tool, for example. These are the apps most commonly trusted by organizations. Asana Turnitin Lucidchart Smartsheet Zoom Zendesk Hubspot Quizlet Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 16
18 CyberLab Customer Case Study Company: UK-based Retailer, over 90,000 Users What Happened: In just one year, the number of unique third-party apps increased from 2,107 to 5,262, with more than 50,000 installs. With thousands of backdoors opening into their corporate environment, the security team knew they needed to identify, classify and make decisions about these apps to prevent breaches. The company looked to develop a high level strategy to whitelist or ban apps based on criteria such as application category (business, social, entertainment, etc.), level of usage (number of installs), type of user (super admin vs. regular user), access scopes, etc. In a large enterprise with both in-house and remote users, the lines between work and personal use is blurred, and it s challenging for IT to understand the specific needs of each and every department. With the number of apps increasing 2.5x over the course of a year, it was very difficult to come up with a scalable and realistic Acceptable Application Use Policy. The senior executive team made a decision that any high risk app should be revoked unless whitelisted based on CloudLock s CARI evaluation, effectively decreasing the unique number of apps by 34% right away, significantly decreasing the associated risk level. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 17
19 Recommendations Cloud application providers are making great strides in securing access at the infrastructure level and have never been more secure. But, neglecting the extension of the perimeter introduced by third-party cloud applications can lead to great risk. A few best practices CloudLock recommends in order to manage third-party applications: Understand what applications your users are authorizing with a strong focus on the ones that connect into your corporate environment. Create a classification and decision hierarchy specific to your organization s needs. Create protocol around which apps should be allowed, reviewed, or automatically revoked. Focus on apps that have the most installs, or most users attached to them. Keep a close eye on admin accounts. A super admin account should never be used to grant access to a third-party app due to the possible enterprise-wide implications. Evaluate the types of apps users are enabling for productivity and consider rolling them out enterprise or department wide. Consolidate apps where needed, and standardize based on the highest level of adoption. Continuously monitor your cloud environments at the application, platform, and infrastructure layer to surface any suspicious occurrences indicating a possible breach. Copyright 2016 CloudLock Inc. The Explosion of Apps: 27% are Risky 18
20 Methodology CloudLock based findings on anonymized usage data across: 150,000+ Unique Apps 1 Billion 10 Million Files Users
21 CloudLock offers the cloud security fabric enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity. By analyzing 1 billion files for more than 10 million end users daily, CloudLock delivers the only complete, risk-appropriate and people-centric approach to cloud security. info@cloudlock.com (781)
Empowering Your Business in the Cloud Without Compromising Security
Empowering Your Business in the Cloud Without Compromising Security Cloud Security Fabric CloudLock offers the cloud security fabric for the enterprise that helps organizations protect their sensitive
More informationSarbanes-Oxley Compliance for Cloud Applications
Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this
More informationIDENTITY SOLUTIONS: Security Beyond the Perimeter
IDENTITY SOLUTIONS: Security Beyond the Perimeter 2016 Cloud Security Alliance All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud
More informationTop 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
More informationCLOUD ADOPTION & RISK IN FINANCIAL SERVICES REPORT
TITLE CLOUD ADOPTION & RISK IN FINANCIAL SERVICES REPORT Q2 2015 Published Q3 2015 Cloud Adoption & Risk in Financial Services Report - Q2 2015 00 TABLE OF CONTENTS 01 02 04 05 07 10 INTRODUCTION OVERVIEW
More information2H 2015 SHADOW DATA REPORT
2H 20 SHADOW DATA REPORT Shadow Data Defined: All potentially risky data exposures lurking in cloud apps, due to lack of knowledge of the type of data being uploaded and how it is being shared. Shadow
More informationAddressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
More informationPCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
More informationSecuring Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
More informationSecuring the Cloud: Making Cloud an Opportunity to Enhance Security
Securing the Cloud: Making Cloud an Opportunity to Enhance Security February 2016 Greg Coughlin Director, IBM Security @JGCoughlin 1 The rise of Shadow IT? 2 Security reality we have all been compromised
More informationTHE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD
Security Intelligence: THE NEW FRONTIER FOR PROTECTING CORPORATE DATA IN THE CLOUD Brought to you by Introduction 3 Data Theft from Cloud Systems of Record 5 6-Step Process to Protect Data from Insider
More informationThe Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
More information... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
More informationIntelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
More informationStay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
More informationHIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
More informationFormulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationCisco AppHQ Enterprise Application Center: Deploy Mobile Business Apps with Confidence
White Paper Cisco AppHQ Enterprise Application Center: Deploy Mobile Business Apps with Confidence The Enterprise Exposed The post-pc era is here, thanks to next-generation mobile devices and applications.
More informationPrivileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
More informationSecuring Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud
Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central
More informationLeveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
More informationDriving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder
Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats Eva Chen CEO and Co-Founder Consistent Vision for 25 Years A world safe for exchanging
More informationVIGILANCE INTERCEPTION PROTECTION
MINIMIZE CYBERTHREATS VIGILANCE INTERCEPTION PROTECTION CYBERSECURITY CDW FINANCIAL SERVICES 80 million identities were exposed by breaches in financial services in 2014. 1 1 symantec.com, Internet Security
More informationThe problem with privileged users: What you don t know can hurt you
The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so
More informationTable of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
More informationAn New Approach to Security. Chris Ellis McAfee Senior System Engineer Chris_Ellis@McAfee.com
An New Approach to Security Chris Ellis McAfee Senior System Engineer Chris_Ellis@McAfee.com Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty
More informationHow To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
More informationWebroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
More informationPassword Management Evaluation Guide for Businesses
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
More informationMOVE YOUR EMAIL To The Cloud With Confidence
MOVE YOUR EMAIL To The Cloud With Confidence Best Practices for Managing Risk in an Office 365 World 1 Move Your Email to the Cloud with Confidence There is a major shift in the world of enterprise technology
More informationIncident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software
Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights
More informationTime Is Not On Our Side!
An audit sets the baseline. Restricting The next steps Authenticating help prevent, Tracking detect, and User Access? respond. It is rare for a few days to pass without news of a security breach affecting
More informationThe Top 7 Ways to Protect Your Data in the New World of
The Top 7 Ways to Protect Your Data in the New World of Shadow IT and Shadow Data Brought to you by Elastica and Centrify Introduction According to research conducted by Elastica, most companies use over
More informationCybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
More informationMobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
More informationKASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationFusing Vulnerability Data and Actionable User Intelligence
Fusing Vulnerability Data and Actionable User Intelligence Table of Contents A New Threat Paradigm... 3 Vulnerabilities Outside, Privileges Inside... 3 BeyondTrust: Fusing Asset and User Intelligence...
More informationWhat Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
More informationThe Cloud App Visibility Blind Spot
WHITE PAPER The Cloud App Visibility Blind Spot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Line-of-business leaders everywhere are bypassing IT departments
More informationCompliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
More informationBEST PRACTICES RESEARCH
2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with
More informationA Guide to Consumerization & Building a BYOD Policy June 2012
INTRODUCTION iphones, ipads, Android-powered devices, and Windows phones have grown into powerful computing platforms, and their use allows enterprise employees to connect to work as never before. These
More informationData- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
More information5THINGS COMPANIES THINK
5THINGS COMPANIES THINK THEY KNOW ABOUT SALESFORCE SECURITY Table of Contents Introduction...01 Misconception #1 Data security is the cloud service provider s problem...02 Misconception #2 We use roles
More informationSecure Thinking Bigger Data. Bigger risk?
Secure Thinking Bigger Data. Bigger risk? MALWARE HACKERS REPUTATION PROTECTION RISK THEFT There has always been data. What is different now is the scale and speed of data growth. Every day we create 2.5
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationExecutive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
More informationData Encryption in the cloud A Handy Guide
Data Encryption in the cloud A Handy Guide Table of Contents Introduction...01 Why Encryption is Different in the Cloud...02 Common Encryption Misconceptions Worth Rethinking...04 Encryption In Action
More informationProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
More informationAdvanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Advanced Cyber Threats Demand a New Privileged Account Security Model Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: In spite of marginal progress, privileged accounts
More information2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY
2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry
More informationRetail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
More informationACI Response to FFIEC Guidance
ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention
More informationThe Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
More informationGLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY
GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY Executive Summary ii Caption: Attacks b % of events 6% 8% 2% 10% 12% 4% THE CHANGING NATURE OF SECURITY Digital businesses are difficult to launch and
More informationAssuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
More informationBreach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security
Breach Findings for Large Merchants 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security Disclaimer The information or recommendations contained herein are
More information2012 Bit9 Cyber Security Research Report
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
More informationCloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
More informationWHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service
WHITE PAPER Managed Security Five Reasons to Adopt a Managed Security Service Introduction Cyber security presents many organizations with a painful dilemma. On the one hand, they re increasingly vulnerable
More informationZero Trust Requires Effective Business-Centric Application Segmentation
Zero Trust Requires Effective Business-Centric Application Segmentation GET STARTED Zero Trust Requires Effective Business-Centric Application Segmentation To protect the network from today s sophisticated
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationThreat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
More informationWHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
More informationTOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT
TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT Would you rather know the presumed status of the henhouse or have in-the-moment snapshots of the fox? If you prefer to use a traditional
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationAddressing the United States CIO Office s Cybersecurity Sprint Directives
RFP Response Addressing the United States CIO Office s Cybersecurity Sprint Directives How BeyondTrust Helps Government Agencies Address Privileged Account Management and Improve Security July 2015 Addressing
More informationMobile Threat Intelligence Report
Mobile Threat Intelligence Report Q1 2016 Overview Mobile malware has been around almost as long as mobile apps, but the worst malware of today is no longer just an annoying inconvenience to the user.
More informationDeveloping National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
More informationManaging the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
More informationCLOUD ADOPTION & RISK IN HEALTHCARE REPORT
CLOUD ADOPTION & RISK IN HEALTHCARE REPORT Q2 2015 Published Q3 2015 Cloud Adoption and Risk in Healthcare Report - Q2 2015 03 TABLE OF CONTENTS INTRODUCTION OVERVIEW OF CLOUD ADOPTION INSIDER THREATS
More informationAPERTURE. Safely enable your SaaS applications.
APERTURE Safely enable your SaaS applications. Unsanctioned use of SaaS (Software as a Service) applications is creating gaps in security visibility and new risks for threat propagation, data leakage and
More informationInternet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
More information9 REALITIES OF PORTABLE AND PERSISTENT DATA PROTECTION IN THE 21 ST CENTURY
9 REALITIES OF PORTABLE AND PERSISTENT DATA PROTECTION IN THE 21 ST CENTURY INTRODUCTION Over the past decade, major data breaches have made headlines, resulting in significant brand damage, costly fines,
More informationBitSight Insights Global View. Revealing Security Performance Metrics Across Major World Economies
BitSight Insights Global View Revealing Security Performance Metrics Across Major World Economies Introduction There is no denying the global nature of 21st century business. The export and import of goods
More informationFranchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
More informationStop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
More informationProtecting Your Network Against Risky SSL Traffic ABSTRACT
Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure
More informationMitigating Bring Your Own Device (BYOD) Risk for Organisations
Mitigating Bring Your Own Device (BYOD) Risk for Organisations Harness the benefits and mitigate the risks of BYOD espiongroup.com Executive Summary Mobile devices such as smart phones, tablets, or laptops
More informationA Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:
A Channel Company White Paper Online Security Beyond Malware and Antivirus Brought to You By: Abstract Security has always encompassed physical and logical components. But in the face of Bring Your Own
More informationTHOUSANDS OF APPS CAN'T BE WRONG: MOBILE APPLICATION ANALYSIS AT SCALE
THOUSANDS OF APPS CAN'T BE WRONG: MOBILE APPLICATION ANALYSIS AT SCALE Chris Eng Vice President, Research Session ID: Session Classification: MBS-T08 Intermediate Agenda State of Mobility in the Enterprise
More informationPresented by: Mike Morris and Jim Rumph
Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network
More informationThe Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
More informationSecurity Intelligence. Information Sharing Strategies Using Trusted Collaboration
Security Intelligence Information Sharing Strategies Using Trusted Collaboration Executive Summary Human-source intelligence (HUMINT) has been used for thousands of years by adversaries to thwart an enemy
More informationData Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
More informationLogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
More informationADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
More informationTop Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering
Top Five Security Must-Haves for Office 365 Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering Today s Agenda Introductions & Company Overview Cloud App Trends, Risks
More informationLearn How to Defend Your Online Marketplace from Unwanted Traffic
Learn How to Defend Your Online Marketplace from Unwanted Traffic Speakers Rami Essaid CEO & Co-founder Distil in Classifieds The Basics of Bots A Bot is an automated program that runs on the internet
More informationAuditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
More informationDynamic Security for the Hybrid Cloud
Dynamic Security for the Hybrid Cloud Marc van Zadelhoff, VP Strategy, Marketing and Product Management, IBM Security Nataraj Nagaratnam, Distinguished Engineer and CTO Security Solutions, IBM Security
More informationThreat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
More informationAnalyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
More information