We need a change in the world of security. Specifically, we need to integrate tools and capabilities when it comes to security.

Traditionally, the primary focus in security has been on perimeter defense. While this is still an essential part of a security setup, we need to broaden the focus in order to increase transparency and secure our transactions.

The cyberthreat landscape is evolving at rapid speed, and it is becoming increasingly challenging for enterprises to sustain cyberattacks and ensure a high level of security. In response, IBM developed a layered reference architecture to counter many threats and help customers create a road map to security.

Different security methods have been implemented in each of the four different domains: people, applications, infrastructure and data.

This layered approach has proven very useful in mitigating a broad variety of threats. It also provides enterprises with much more transparency in their transaction monitoring in each of the security domains. With this architecture, it is now possible to understand and utilize the security information collected across different areas.

Challenges Moving Forward

We are still missing a piece in the puzzle: You must integrate and correlate all the information collected in the different domains in a way that makes sense. The right system should be able to analyze real-time events and store data for forensic purposes.

As mentioned, the nature of cybercrime is changing at an unprecedented pace, and the world has witnessed a stream of major breaches across different industries. Cybercriminals are more organized and collaborative, taking advantage of the latest technologies to improve their tactics. In addition, the explosion of data, increasing adoption of cloud and mobile and the extensive use of social media have made it easier for insiders to unintentionally open the door to new risks such as advanced persistent threats (APTs).

The desire to have an agile enterprise that instantly adopts the latest technology and at the same time maintains a high level of security can be a difficult discipline to master. So far, the greatest challenge has been to correlate and understand the extensive amounts of information collected in each domain, but it is now possible.

Why Integrate Security Tools?

By leveraging the intelligence and analytics engine of a security information and event management (SIEM) solution, we can now analyze huge numbers of events and send out a manageable amount of alerts based on the events that actually matter to security operations centers (SOCs), help desks or auditors, all in real time.

With its comprehensive monitoring capabilities, a SIEM solution also makes it possible to determine base-level behavior of the enterprise. The solution can then send alerts if it detects patterns deviating from the base level.

This provides a very strong foundation for mitigating security risks across all domains. The transparency provided by this architecture enables enterprises to control abnormalities such as data leaving the enterprise, which has previously proven to be a very challenging task. Experience shows that often an attacker will analyze each domain for weak points such as:

  • Poor firewall configuration;
  • Poor user ID life cycle management;
  • Poor application security;
  • Poor database management;
  • Poor user context at the time of authentication; or
  • Weak server maintenance.

As attackers take a more sophisticated approach, managing security has become a more complex task. Correlating and analyzing all events and network flows across domains enable security to achieve a much higher level of transparency, uncover threats that might have otherwise entered the environment and create a trustworthy enterprise.

A solution with this type of analytic capability and transparency will also be the cornerstone when it comes time to enforce processes that comply with the EU’s impending data protection act. Because we can collect information from many events, it will be much easier to track data, monitor information flow and ensure compliance with all regulations.

Integrating all event sources, and adding analytics to evaluate and conduct a risk assessment, is the best way to secure the enterprise.

More from Intelligence & Analytics

ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)

7 min read - In late April 2023, IBM Security X-Force uncovered documents that are most likely part of a phishing campaign mimicking credible senders, orchestrated by a group X-Force refers to as ITG10, and aimed at delivering RokRAT malware, similar to what has been observed by others. ITG10's tactics, techniques and procedures (TTPs) overlap with APT37 and ScarCruft. The initial delivery method is conducted via a LNK file, which drops two Windows shortcut files containing obfuscated PowerShell scripts in charge of downloading a…

7 min read

SOCs Spend 32% of the Day On Incidents That Pose No Threat

4 min read - When it comes to the first line of defense for any company, its Security Operations Center (SOC) is an essential component. A SOC is a dedicated team of professionals who monitor networks and systems for potential threats, provide analysis of detected issues and take the necessary actions to remediate any risks they uncover. Unfortunately, SOC members spend nearly one-third (32%) of their day investigating incidents that don't actually pose a real threat to the business according to a new report…

4 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Despite Tech Layoffs, Cybersecurity Positions are Hiring

4 min read - It’s easy to read today’s headlines and think that now isn’t the best time to look for a job in the tech industry. However, that’s not necessarily true. When you read deeper into the stories and numbers, cybersecurity positions are still very much in demand. Cybersecurity professionals are landing jobs every day, and IT professionals from other roles may be able to transfer their skills into cybersecurity relatively easily. As cybersecurity continues to remain a top business priority, organizations will…

4 min read