December 3, 2014 By Rick M Robinson 2 min read

In the days of yore, when most computers were connected via wired local networks, organizations typically relied on endpoint protection to ensure the integrity of their networks and the security of their data. Like the walls and moat of a castle, endpoint security was based on a simple principle: Keep threats outside, and the interior will be safe.

However, the information world has changed. Internet connectivity has made every PC in the network a potential endpoint. Mobile devices and cloud computing have globalized the local network, rendering uncertain the very concepts of endpoints and perimeters.

Today, a “moat of intelligence” is needed to safeguard an organization’s valuable data.

Security: From Myths to Reality

As networks have become more complex and cybersecurity threats more ruthless and sophisticated, too many organizations have retreated into security myths. Either they indulge in wishful thinking (“We won’t be hacked”) or they become paranoid (“We need to lock down everything”). Neither is true.

At a recent Web event, Brendan Hannigan, general manager of IBM Security Systems, outlined how firms can protect themselves against today’s threats. He said the concept of a castle moat needs to be replaced by a moat of intelligence: an active understanding of threats and an awareness of what needs to be protected most against those threats.

Building the Moat of Intelligence

According to Hannigan, a key first step in protecting information security is to “know thyself.” While 70 percent of the value of modern publicly traded firms is embodied in their intellectual property and other data, this highest-value information may account for less than 2 percent, down to as little as 0.01 percent, of total data repositories.

Trying to protect everything can end up protecting nothing. Therefore, firms should concentrate their efforts on guarding this high-value information while giving other data an appropriate measure of security. This means information holdings must be assessed.

The other component of the moat of intelligence is actively engaging security threats. Today’s cybercriminals are sophisticated and determined, but they do not have magical powers. Like burglars in the brick-and-mortar world, they have to “case the joint” to find and steal high-value information. Security intrusions leave distinctive and detectable traces that security experts can recognize.

Enlisting Security Allies

By working with the broader security community, a firm’s security team can tap into the latest threat profiles and security intelligence resources. Organizations do not need to protect themselves in isolation; they can enlist powerful allies in the cause of information security. While mobile and the cloud have posed new security challenges, they have also provided powerful new security tools.

Yes, providing information security today is a challenging task. But by building a moat of intelligence, organizations can protect themselves in a changing information environment.

More from Intelligence & Analytics

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today