Category Archives: Network Security

Charles Leaver – The Security Industry Has To Have Strategic Alliances

Published by:

Written By Charles Leaver


No one can resolve cybersecurity alone. No one solution business, no single provider, no one can take on the whole issue. To take on security needs cooperation between different players.

Often, those companies are at different levels of the service stack – some set up on endpoints, some within applications, others within network routers, others at the telco or the cloud.

Sometimes, those players each have a specific best-of-breed piece of the puzzle: one player specializes in email, others in crypto, others in disrupting the kill chain.

From the business consumer’s viewpoint, effective security requires assembling a set of tools and services into a working whole. Speaking from the suppliers’ viewpoint, effective security needs strategic alliances. Sure, each supplier, whether making hardware, composing software, or offering services, has its own products and copyright. Nevertheless, we all work better when we interact, to enable integrations and make life simple for our resellers, our integrators- and that end consumer.

Paradoxically, not just can vendors make more profit through strategic alliances, however end clients will save money at the same time. Why? Numerous reasons.

Clients do not squander their cash (and time) with products which have overlapping capabilities. Consumers do not need to lose money (and time) creating custom-made integrations. And consumers won’t squander profits (and time) attempting to debug systems that fight each other, such as by triggering extra alerts or hard-to-find incompatibilities.

It’s the Trifecta – Products, Services, and Channels

All 3 interact to meet the needs of the business customer, as well as benefit the suppliers, who can focus on doing what they do best, relying on tactical alliances to create total services out of jigsaw puzzle pieces.

Normally speaking, those services need more than easy APIs – which is where tactical alliances come in.

Consider the integration in between solutions (like a network risk scanner or Ziften’s endpoint visibility options) and analytics options. End clients don’t want to operate a dozen various control panels, and they do not want to manually correlate anomaly findings from a lot of different security tools. Strategic alliances between product suppliers and analytics services – whether on-site or in the cloud – make good sense for everybody. That includes for the channel, who can provide and support total options that are currently dialed in, already debugged, already documented, and will work with the least hassle possible.

Or consider the integration of solutions and managed security services providers (MSSPs). They want to provide prospective customers pre-packaged services, preferably which can run in their multi-tenant clouds. That implies that the products should be scalable, with synergistic license terms. They need to be well-integrated with the MSSP’s existing control panels and administrative control systems. And naturally, they have to feed into predictive analytics and occurrence response programs. The very best way to do that? Through tactical alliances, both horizontally with other product suppliers, and with major MSSPs as well.

What about significant value add resellers (VAR)? VARs require products that are simple to understand, easy to support, and easy to include into existing security deployments. This makes new solutions more enticing, more budget friendly, much easier to set up, easier to support – and reinforce the VAR’s client relationships.

Exactly what do they search for when adding to their solution portfolio? New solutions that have strategic alliances with their existing product offerings. If you don’t dovetail in to the VAR’s portfolio partners, well, you probably don’t fit in.

Two Examples: Fortinet and Microsoft

No one can fix cybersecurity alone, and that consists of giants like Fortinet and Microsoft.

Consider the Fortinet Fabric-Ready Partner Program, where technology alliance partners integrate with the Fortinet Security Fabric through Fabric APIs and are able to actively gather and share information to improve danger intelligence, boost overall hazard awareness, and widen danger response from end to end. As Fortinet describes in their Fortinet Fabric-Ready Partner Program Overview, “partner addition in the program signals to clients and the market at large that the partner has actually worked together with Fortinet and leveraged the Fortinet Fabric APIs to develop verified, end-to-end security options.”

Likewise, Microsoft is pursuing a comparable strategy with the Windows Defender Advanced Threat Protection program. Microsoft just recently picked only a few essential partners into this security program, stating, “We have actually spoken with our customers that they want protection and visibility into prospective threats on all of their device platforms and we have actually turned to partners to assist address this requirement. Windows Defender ATP provides security teams a single pane of glass for their endpoint security and now by teaming up with these partners, our clients can extend their ATP service to their whole install base.”

We’re the first to admit: Ziften cannot resolve security alone. Nobody can. The best way forward for the security market is to progress together, through strategic alliances combining item suppliers, service providers, and the channel. That way, we all win, suppliers, service companies, channel partners, and business clients alike.

Charles Leaver – SysSecOps And Flexibility Is The Only Way Forward

Published by:

Written By Charles Leaver


You will find that endpoints are everywhere. The device you’re reading this on is an endpoint, whether it’s a desktop, laptop, tablet, or phone. The HEATING AND COOLING controller for your building is an endpoint, assuming it’s linked to a network, and the WiFi access points and the security electronic cameras too. So is the linked automobile. So are the Web servers, storage servers, and Active Directory site servers in the data center. So are your IaaS/PaaS services in the cloud, where you are in control of bare-metal servers, VMware virtual machines, or containers operating on Windows and/or Linux.

They’re all endpoints, and all are necessary to handle.

They need to be handled from the IT side (from IT administrators, who ideally have proper IT-level visibility of each connected thing like those security electronic cameras). That management suggests making certain they’re linked to the right network zones or VLANs, that their software applications and configurations the current version, that they’re not flooding the network with bad packets due to electrical faults and so-on.

Those endpoints likewise need to be handled from the security point of view by CISO teams. Every endpoint is a prospective entrance into the enterprise network, which suggests the devices need to be locked down – default passwords never used, all security patches applied, no unapproved software set up on the device’s ingrained web server. (Kreb’s outlines how, in 2014, hackers broke into Target’s network through its HVAC system.).

Systems and Security Operations.

Systems Security Operations, or SysSecOps, brings those two worlds together. With the right kind of SysSecOps state of mind, and tools that support the proper workflows, IT and security workers get the same data and can collaborate together. Sure, they each have various tasks, and react differently to trouble alerts, however they’re all handling the exact same endpoints, whether in the pocket, on the desk, in the energy closet, in the data center, or in the cloud.

Ziften Zenith Test Report.

We were thrilled when the recently published Broadband-Testing report praised Zenith, Ziften’s flagship end-point security and management platform, as being perfect for this type of circumstance. To quote from the recent report, “With its Zenith platform, Ziften has a solution that ticks all the SysSecOps boxes and more. Since its definition of ‘endpoints’ extends into the Data Centre (DC) and the world of virtualisation, it is true blanket coverage.”.

Broadband-Testing is an independent testing center and service based in Andorra. They describe themselves as, “Broadband-Testing engages with vendors, media, financial investment groups and VCs, analysts and consultancies alike. Evaluating covers all elements of networking hardware and software, from ease of use and efficiency, through to significantly important elements such as device power consumption measurement.”

Back to versatility. With endpoints all over (once again, on the desk, in the utility closet, in the data center, or in the cloud), a SysSecOps-based endpoint security and management system need to go everywhere and do anything, at scale. Broadband-Testing composed:

“The configuration/deployment alternatives and architecture of Ziften Zenith allow for a really versatile deployment, on or off-premise, or hybrid. Agent deployment is simplicity itself with zero user requirements and no endpoint intrusion. Agent footprint is likewise minimal, unlike lots of endpoint security solutions. Scalability also seems outstanding – the greatest customer release to this day remains in excess of 110,000 endpoints.”

We cannot help but be proud of our product Zenith, and exactly what Broadband-Testing concluded:

“The development of SysSecOps – integrating systems and security operations – is an uncommon moment in IT; a hype-free, common sense technique to refocusing on how systems and security are managed inside a company.

Secret to Ziften’s endpoint approach in this classification is overall visibility – after all, how can you secure exactly what you can’t see or don’t know is there in the first place? With its Zenith platform, Ziften has a product that ticks all the SysSecOps boxes and more.

Deployment is easy, specifically in a cloud-based situation as evaluated. Scalability likewise seems excellent – the greatest client deployment to date is in excess of 110,000 endpoints.

Data analysis alternatives are extensive with a huge amount of information readily available from the Ziften console – a single view of the whole endpoint infrastructure. Any item can be evaluated – e.g. Binaries, applications, systems – and, from a procedure, an action can be defined as an automated function, such as quarantining a system in the event of a potentially harmful binary being discovered. Multiple reports are predefined covering all areas of analysis. Alerts can be set for any event. Additionally, Ziften supplies the idea of extensions for customized data collection, beyond the reach of the majority of vendors.

And with its External API performance, Ziften-gathered endpoint data can be shared with many 3rd party applications, therefore adding further value to a client’s existing security and analytics infrastructure investment.

In general, Ziften has a very competitive offering in exactly what is a very worthy and emerging IT classification in the form of SysSecOps that is very deserving of assessment.”.

We hope you’ll consider an evaluation of Zenith, and will concur that when it pertains to SysSecOps and endpoint security and management, we do tick all the boxes with the true blanket protection that both your IT and CISO groups have actually been looking for.

Charles Leaver – Understand About Meltdown And Spectre And How Ziften Can Assist You

Published by:

Written By Josh Harriman And Presented By Charles Leaver


Ziften is aware of the current exploits impacting almost everybody who works on a computer or digital device. While this is a very large statement, we at Ziften are working diligently helping our consumers discover susceptible assets, repairing those vulnerable systems, and keeping an eye on systems after the fix for possible efficiency concerns.

This is an ongoing investigation by our group in Ziften Labs, where we keep up-to-date on the current malicious attacks as they develop. Right now, most of the conversations are around PoC code (Proof of Concept) and what can theoretically occur. This will soon alter as hackers benefit from these chances. The exploits I’m speaking, obviously, are Meltdown and Spectre.

Much has been blogged about how these exploits were discovered and exactly what is being done by the industry to find workarounds to these hardware concerns. To find out more, I feel it’s appropriate to go right to the source here (

What Do You Need To Do, and How Can Ziften Assist?

A crucial area that Ziften assists with in case of an attack by either method is monitoring for data exfiltration. Considering that these attacks are essentially taking data they shouldn’t have access to, we believe the first and most convenient techniques to safeguard yourself is to take this personal data off these systems. This data might be passwords, login credentials or even security secrets for SSH or VPN access.

Ziften checks and notifies when procedures that generally do not make network connections start exhibiting this uncommon habit. From these notifications, users can quarantine systems from the network and / or eliminate processes connected with these scenarios. Ziften Labs is monitoring the advancement of the attacks that are most likely to become offered in the wild related to these vulnerabilities, so we can better secure our clients.

Find – How am I Vulnerable?

Let’s look at areas we can examine for susceptible systems. Zenith, Ziften’s flagship item, can simply and rapidly find OS’s that have to be patched. Despite the fact that these exploits are in the CPU chips themselves (Intel, AMD and ARM), the fixes that will be readily available will be upgraded to the OS, and in other cases, the internet browser you use too.

In Figure 1 below, you can see one example of how we report on the available patches by name, and what systems have effectively set up each patch, and which have yet to install. We can likewise track patch installs that stopped working. The example shown below is not for Meltdown or Spectre, but the KB and / or patch number for the environment could be occupied on this report to reveal the susceptible systems.

The exact same is true for internet browser updates. Zenith keeps track of for software application variations running in the environment. That data can be used to understand if all browsers the current version once the fixes appear.

Mentioning browsers, one area that has actually currently picked up steam in the attack scenarios is utilizing Javascript. A working copy is revealed here (

Products like Edge browsers do not utilize Javascript any longer and mitigations are available for other web browsers. Firefox has a fix readily available here ( A Chrome fix is coming out this week.

Fix – What Can I Do Now?

As soon as you have actually identified vulnerable systems in your environment you definitely need to patch and repair them very quickly. Some safeguards you have to take into consideration are reports of certain Anti-Virus products causing stability concerns when the patches are applied. Information about these concerns are here ( and here (

Zenith also has the ability to help patch systems. We can monitor for systems that require patches, and direct our solution to apply those patches for you and then report success / failure and the status of those still needing patching.

Since the Zenith backend is cloud based, we can even monitor your endpoint systems and use the needed patches when and if they are not connected to your business network.

Monitor – How is it all Running?

Lastly, there may be some systems that display performance degradation after the OS fixes are used. These issues appear to be restricted to high load (IO and network) systems. The Zenith platform assists both security and operational groups within your environment. Exactly what we like to call SysSecOps (

We can help discover issues such as hangs or crashes of applications, and system crashes. Plus, we monitor system usage for Memory and CPU gradually. This data can be utilized to monitor and notify on systems that begin to display high usage compared to the period prior to the patch was used. An example of this monitoring is displayed in Figure 2 below (system names purposefully removed).

These ‘defects’ are still brand-new to the public, and a lot more will be discussed and found for days / weeks / months to come. Here at Ziften, we continue to monitor the situation and how we can best inform and safeguard our customers and partners.

Charles Leaver – Find Out Why You Must Have SysSecOps

Published by:

Written By Alan Zeichick And Presented By Charles Leaver


SysSecOps. That’s a new phrase, still not known by many IT and security administrators – but it’s being discussed within the industry, by experts, and at technical conferences. SysSecOps, or Systems & Security Operations, describes the practice of uniting security groups and IT operations groups to be able to make sure the health of enterprise technology – and having the tools to be able to react most effectively when issues happen.

SysSecOps focuses on taking apart the information walls, disrupting the silos, that get in between security groups and IT administrators.

IT operations staff are there to guarantee that end-users can access applications, and also important infrastructure is operating at all times. They wish to maximize access and availability, and need the data required to do that task – like that a brand-new worker needs to be provisioned, or a hard disk drive in a RAID array has failed, that a new partner has to be provisioned with access to a secure file repository, or that an Oracle database is ready to be moved to the cloud. It’s all about innovation to drive the business.

Same Data, Various Use-Cases

While making use of endpoint and network monitoring information and analytics are plainly tailored to fit the diverse requirements of IT and security, it ends up that the underlying raw data is really the exact same. The IT and security teams simply are taking a look at their own domain’s issues and circumstances – and doing something about it based upon those use-cases.

Yet sometimes the IT and security teams need to interact. Like provisioning that brand-new company partner: It needs to touch all the best systems, and be done securely. Or if there is an issue with a remote endpoint, such as a mobile phone or a mechanism on the Industrial Internet of Things, IT and security might need to work together to figure out exactly what’s going on. When IT and security share the very same data sources, and have access to the same tools, this task ends up being a lot easier – and therefore SysSecOps.

Imagine that an IT administrator finds that a server hard disk is nearing full capacity – and this was not expected. Perhaps the network had actually been breached, and the server is now being used to steam pirated films across the Internet. It happens, and finding and fixing that issue is a job for both IT and security. The data collected by endpoint instrumentation, and displayed through a SysSecOps-ready tracking platform, can help both sides working together more effectively than would happen with conventional, unique, IT and security tools.

SysSecOps: It’s a new term, and a brand-new idea, and it’s resonating with both IT and security teams. You can discover more about this in a short nine-minute video, where I speak to several market experts about this topic: “What is SysSecOps?”

Charles Leaver – With Ziften You Can Protect Against Microsoft Word Phishing

Published by:

Written By Josh Harriman And Presented By Charles Leaver


An intriguing multifaceted attack has been reported in a recent blog by Cisco’s Talos Intelligence group. I wanted to discuss the infection vector of this attack as it’s quite fascinating and something that Microsoft has promised not to fix, as it is a function and not a bug. Reports are coming in about attacks in the wild which are making use of a function in Microsoft Word, called Dynamic Data Exchange (DDE). Details to how this is accomplished are reported in this blog from SecureData.

Special Phishing Attack with Microsoft Word

Attackers constantly search for brand-new methods to breach an organization. Phishing attacks are among the most typical as opponents are counting on that someone will either open a file sent to them or go to a ‘fabricated’ URL. From there an exploit on a vulnerable piece of software normally provides access to begin their attack.

But in this case, the files didn’t have a destructive item embedded in the Word doc, which is a favorite attack vector, but rather a sly way of utilizing this function that enables the Word program to connect out to obtain the real destructive files. This way they might hope or rely on a better success rate of infection as harmful Word files themselves can be scanned and deleted prior to reaching the recipient.

Searching for Suspicious Behaviors with Ziften Zenith

Here at Ziften, we wished to have the ability to alert on this behavior for our clients. Finding conditions that exhibit ‘strange’ behavior such as Microsoft Word generating a shell is fascinating and not expected. Taking it a bit further and trying to find PowerShell operating from that generated shell and it gets ‘extremely’ intriguing. By using our Search API, we can find these habits no matter when they took place. We do not need the system to be on at the time of the search, if they have run a program (in this case Word) that displayed these behaviors, we can discover that system. Ziften is always collecting and sending pertinent procedure details which is why we can find the data without counting on the system state at the time of browsing.

In our Zenith console, I looked for this condition by trying to find the following:

Process → Filepath contains word.exe, Child Process Filepath contains cmd.exe, Child Process command line contains powershell

This returns the PIDs (Process ID) of the procedures we saw start-up with these conditions. From there we can drill down to see the critical information.

In this very first screenshot, we can see information around the procedure tree (Word spawning CMD with Powershell under that) on the left, and to the right side you can see information like the System name and User, plus start time.

Listed below in the next image, we look at the CMD procedure and get details regarding exactly what was passed to Powershell.

More than likely when the user had to address this Microsoft Word pop up dialog box, that is when the CMD shell utilized Powershell to head out and get some code that was hosted on the Louisiana Gov site. In the Powershell screenshot below we can see more information such as Network Connect details when it was reaching out to the website to pull the fonts.txt file.

That IP address ( is in truth the Louisiana Gov site. Sometimes we see interesting data within our Network Connect details that may not match exactly what you anticipate.

After developing our Saved Search, we can inform on these conditions as they happen throughout the environment. We can also create extensions that change a GPO policy to not enable DDE or even take more action and go and find these files and remove them from the system if so preferred. Having the ability to discover intriguing mixes of conditions within an environment is very effective and we are very proud to have this feature in our product.

Charles Leaver – Stop Ransomware Attacks And Manage Them With This

Published by:

Written By Alan Zeichick And Presented By Charles Leaver


Ransomware is real, and is striking people, companies, schools, medical facilities, local governments – and there’s no sign that ransomware is ending. In fact, it’s most likely increasing. Why? Let’s face it: Ransomware is most likely the single most effective attack that cyber criminals have ever developed. Anyone can create ransomware utilizing readily offered tools; any loan received is most likely in untraceable Bitcoin; and if something goes wrong with decrypting someone’s hard drive, the hacker isn’t impacted.

A business is hit with ransomware every 40 seconds, according to some sources, and sixty percent of malware issues were ransomware. It strikes all sectors. No industry is safe. And with the rise of RaaS (Ransomware-as-a-Service) it’s gon na get worse.

The good news: We can resist. Here’s a four-step fight plan.

Great Standard Hygiene

It starts with training workers the best ways to deal with harmful emails. There are falsified messages from business partners. There’s phishing and target spearphishing. Some will make it through email spam/malware filters; employees have to be taught not to click on links in those messages, or obviously, not to allow for apps or plug-ins to be set up.

However, some malware, like ransomware, will get through, frequently making use of obsolete software or unpatched systems, as in the Equifax breach. That’s where the next step comes in:

Guaranteeing that end points are completely patched and entirely up-to-date with the latest, most safe and secure os, applications, utilities, device drivers, and code libraries. In this way, if there is an attack, the end point is healthy, and has the ability to best fight off the infection.

Ransomware isn’t an innovation or security problem. It’s a company issue. And it’s so much more than the ransom that is demanded. That’s nothing compared to loss of efficiency because of downtime, poor public relations, angry consumers if service is disrupted, and the cost of reconstructing lost data. (Which presumes that valuable intellectual property or secured monetary or client health data isn’t really taken.).

Exactly what else can you do? Backup, backup, backup, and safeguard those backups. If you don’t have safe, protected backups, you cannot bring back data and core infrastructure in a timely style. That consists of making day-to-day snapshots of virtual machines, databases, applications, source code, and configuration files.

Services require tools to identify, identify, and avoid malware like ransomware from dispersing. This requires constant visibility and reporting of exactly what’s occurring in the environment – consisting of “zero day” attacks that have not been seen prior to this. Part of that is keeping an eye on endpoints, from the smart phone to the desktop to the server to the cloud, to ensure that all endpoints are updated and safe, which no unexpected changes have actually been made to their underlying configuration. That way, if a device is contaminated by ransomware or other malware, the breach can be discovered rapidly, and the machine separated and closed down pending forensics and recovery. If an endpoint is breached, fast containment is important.

The Four Tactics.

Great user training. Updating systems with patches and repairs. Backing up everything as typically as possible. And utilizing monitoring tools to assist both IT and security groups find issues, and react rapidly to those issues. When it comes to ransomware, those are the four battle tested tactics we need to keep our companies safe.

You can find out more about this in a brief 8 minute video, where I speak with numerous industry professionals about this concern:

Charles Leaver – Enhanced Cyber Protection From Microsoft And Ziften

Published by:

Written By David Shefter And Presented By Charles Leaver


This week we revealed a partnership with Microsoft that unites Ziften’s Zenith ® systems and security operations platform, and Windows Defender Advanced Threat Protection (ATP) providing a cloud based, “single pane of glass” to detect, see, examine, and respond to sophisticated cyber attacks and breaches on Windows, macOS, and Linux-based devices (desktops, laptops, servers, cloud, etc).

Windows Defender ATP plus Ziften Zenith is a security service that makes it possible for enterprise customers to spot, examine, respond and remediate advanced dangers on their networks, off-network, and in the data center and cloud.

Imagine a single option across all the devices in your enterprise, supplying scalable, state of the art security in an economical and simple to use platform. Enabling enterprises throughout the world to protect and handle devices through this ‘single pane of glass’ delivers the promise of lower functional expenses with true enhanced security delivering real time international danger protection with information collected from billions of devices worldwide.

Microsoft and Ziften Architecture

The diagram listed below offers an overview of the service parts and integration struck between Windows Defender ATP and Ziften Zenith.

Endpoint examination capabilities let you drill down into security signals and understand the scope and nature of a prospective breach. You can send files for deep analysis, get the outcomes and take remediation without leaving the Windows Defender ATP console.

Spot and Contain Risks

With the Windows Defender ATP and Ziften Zenith integration, organizations can easily discover and contain threats on Windows, macOS, and Linux systems from an individual console. Windows Defender ATP and Ziften Zenith offer:

Based on behavior, cloud-powered, advanced attack detection. Discover the attacks that get past your other defenses (post breach detection).

Abundant timeline for forensic examination and mitigation. Quickly examine the scope of any breach or presumed habits on any device through an abundant, 6-month device timeline.

Built in special threat intelligence knowledge base. Hazard intelligence to quickly identify attacks based on tracking and data from billions of devices.

The diagram below highlights a lot of the macOS and Linux hazard detection and response capabilities now readily available with Windows Defender ATP.

At the end of the day, if you’re seeking to protect your end points and infrastructure, you need to take a tough look at Windows Defender ATP and Ziften Zenith.

Charles Leaver – You Have Heard Of The KRACK Vulnerability Here Is What You Do

Published by:

Written By Dr Al Hartmann And Presented By Charles Leaver


Enough media attention has actually been generated over the Wi-Fi WPA2-defeating Key Reinsertion Attack (KRACK), that we do not have to re-cover that ground. The original discoverer’s website is a good location to review the problems and link to the in-depth research paper. This might be the greatest attention paid to a fundamental communications security failure since the Heartbleed attack. In that earlier attack, a patched variation of the vulnerable OpenSSL code was released on the same day as the public disclosure. In this brand-new KRACK attack, similar accountable disclosure guidelines were followed, and patches were either currently released or quickly to follow. Both wireless end points and wireless network devices should be appropriately patched. Oh, and good luck getting that Chinese knockoff wireless security camera bought off eBay patched quickly.

Here we will simply make a couple of points:

Take inventory of your wireless devices and take action to ensure proper patching. (Ziften can carry out passive network stock, including wireless networks. For Ziften monitored endpoints, the available network interfaces in addition to applied patches are reported.) For business IT personnel, it is patch, patch, patch every day anyhow, so absolutely nothing new here. However any unmanaged wireless devices ought to be identified and verified.

Windows and iOS end points are less susceptible, while unpatched Linux and Android end points are extremely prone. A lot of Linux endpoints will be servers without wireless networking, so not as much direct exposure there. However Android is another story, particularly given the balkanized state of Android updating across device producers. Most likely your business’s biggest direct exposure will be IoT and Android devices, so do your risk analysis.

Prevent wireless access by means of unencrypted protocols such as HTTP. Adhere to HTTPS or other encrypted protocols or utilize a secure VPN, but know some default HTTPS sites allow jeopardized devices to coerce downgrade to HTTP. (Note that Ziften network monitoring reports IP addresses and ports used, so have a look at any wireless port 80 traffic on endpoints that are unpatched.).

Continue whatever wireless network hygiene practices you have been employing to identify and silence rogue access points, unapproved wireless devices, and so on. Grooming access point placement and transmission zones to lessen signal spillage outside your physical boundaries is likewise a smart practice, considering that KRACK aggressors should be present locally within the wireless network. Don’t give them advantaged placement chances inside or near your environment.

For a more wider conversation around the KRACK vulnerability, have a look at our current video on the topic:

Charles Leaver – Train Your Staff Effectively About Security

Published by:

Written By Charles Leaver Ziften CEO


Effective corporate cybersecurity assumes that people – your staff members – do the best thing. That they do not turn over their passwords to a caller who claims to be from the IT department doing a “qualifications audit.” That they do not wire $10 million to an Indonesian checking account after getting a midnight demand from “the CEO”.

That they do not set up an “immediate upgrade” to Flash Player based upon a pop-up on a porn website. That they do not overshare on social networks. That they do not save business details on file sharing services outside the firewall. That they don’t link to unsecure WiFi networks. And they don’t click on links in phishing e-mails.

Our research study reveals that 75+% of security incidents are triggered or helped by staff member errors.

Sure, you’ve installed endpoint security, email filters, and anti-malware solutions. Those precautions will probably be for nothing, however, if your employees do the wrong thing time and again when in a hazardous scenario. Our cybersecurity efforts are like having an elegant automobile alarm: If you don’t teach your teenager to lock the vehicle when it’s at the mall, the alarm is worthless.

Security awareness isn’t enough, of course. Employees will make errors, and there are some attacks that do not need a worker bad move. That’s why you need endpoint security, email filters, anti-malware, and so on. But let’s speak about reliable security awareness training.

Why Training Frequently Fails to Have an Effect

Initially – in my experience, a lot of staff member training, well, is poor. That’s particularly true of online training, which is usually dreadful. However for the most parts, whether live or canned, the training does not have credibility, in part due to the fact that lots of IT experts are poor and unconvincing communicators. The training often focuses on communicating and implementing rules – not altering dangerous behavior and habits. And it’s like getting mandatory copy machine training: There’s nothing in it for the staff members, so they don’t accept it.

It’s not about implementing rules. While security awareness training might be “owned” by various departments, such as IT, CISO, or HR, there’s often an absence of knowledge about what a safe awareness program is. First of all, it’s not a checkbox; it needs to be ongoing. The training should be delivered in different ways and times, with a mix of live training, newsletters, small-group conversations, lunch-and-learns, and yes, even online resources.

Safeguarding yourself is not complicated!

But a big problem is the absence of objectives. If you do not know exactly what you’re attempting to do, you cannot see if you have actually done an excellent job in the training – and if dangerous habits in fact alter.

Here are some sample goals that can result in effective security awareness training:

Offer staff members with the tools to acknowledge and handle ongoing day-to-day security dangers they may receive online and via e-mail.

Let workers understand they belong to the group, and they can’t just rely on the IT/CISO teams to deal with security.

Halt the cycle of “unintended ignorance” about safe computing practices.

Modify state of minds toward more safe practices: “If you observe something, say something”.

Review of company guidelines and procedures, which are described in actionable terms which relate to them.

Make it Appropriate

No matter who “owns” the program, it’s important that there is visible executive backiong and management buy-in. If the officers don’t care, the staff members will not either. Effective training won’t talk about tech buzzwords; rather, it will concentrate on changing behaviors. Relate cybersecurity awareness to your staff members’ individual life. (And while you’re at it, teach them the best ways to keep themselves, their family, and their house safe. Odds are they don’t know and hesitate to ask).

To make security awareness training truly relevant, obtain employee ideas and motivate feedback. Step success – such as, did the variety of external links clicked by workers decrease? How about calls to tech assistance originating from security violations? Make the training prompt and real-world by consisting of recent rip-offs in the news; unfortunately, there are so many to select from.

In other words: Security awareness training isn’t fun, and it’s not a silver bullet. However, it is important for guaranteeing that risky staff member habits do not weaken your IT/CISO efforts to protect your network, devices, applications, and data. Make certain that you continually train your employees, and that the training works.

Charles Leaver – Feel The Excitement Of The Latest Splunk .conf

Published by:

Written By Josh Applebaum And Presented By Charles Leaver


Like so many of you, we’re still recuperating from Splunk.conf recently. As usual,. conf had terrific energy and the people who remained in participation were passionate about Splunk and the many usage cases that it offers through the large app ecosystem.

One crucial statement throughout the week worth discussing was a new security offering called “Content Updates,” which basically is pre-built Splunk searches for assisting to detect security events.

Basically, it has a look at the most recent attacks, and the Splunk security group produces new searches for how they would look through Splunk ES data to discover these types of attacks, and after that ships those brand-new searches to consumer’s Splunk ES environments for automatic notifications when seen.

The best part? Because these updates are using mainly CIM (Common Info Model) data, and Ziften populates a great deal of the CIM models, Ziften’s data is already being matched versus the new Content Updates Splunk has actually produced.

A fast demonstration revealed which vendors are adding to each type of “detection” and Ziften was pointed out in a great deal of them.

For instance, we have a current blog post that shares how Ziften’s data in Splunk is utilized to identify and react to WannaCry.

Overall, with the around 500 individuals who came by the booth over the course of.conf I have to say it was one of the very best occasions we have actually done in terms of quality discussions and interest. We had nothing but positive reviews from our thorough discussions with all walks of business life – from extremely technical experts in the public sector to CISOs in the monetary sector.

The most typical conversation usually began with, “We are just beginning to roll out Splunk and are new to the platform.” I like those, because people can get our Apps totally free and we can get them an agent to try out and it gets them something to use right out of the box to show value right away. Other folks were extremely skilled and actually liked our approach and architecture.

Bottom line: People are genuinely thrilled about Splunk and real services are offered to assist people with real problems!

Want to know more? The Ziften ZFlow App and Technology Add-on assists users of Splunk and Splunk ES usage Ziften-generated extended NetFlow from end points, servers, and cloud VMs to see what they are missing out on at the perimeters of their network, their data centers, and in their cloud implementations.