Security experts and IT executives told us that continuous threat management tools with real-time visibility and response are the most effective.
DZone- Read our CISO, Robert Huber thoughts on what security practices are the most effective.
Encryption. A password manager that controls access. People within companies cause the most problems. Provide training on how to avoid malware and phishing attacks. The Yahoo breach was due to an employee clicking on a malicious link.
Go back to the basics with standard components. Non-glamorous system handling, account management, continuous monitoring, and patching. Automation platform allows IT to get more done with less.
Use well-known techniques, libraries, and algorithms. Make sure you are encrypting and salting correctly. Test everything. Unit test for open SSL. When a vulnerability is discovered, push through patches quickly for your own code and third-party libraries. Deploy, build, and test. Be ready to react when a problem arises and respond quickly to fix it.
Look for vulnerabilities as early as possible. This is not always doable with applications built in the past or containing third-party code that’s already in the field. For those, you need to be performing dynamic code analysis security testing. Get an understanding of the risk to the applications already in production. Discover what’s out there. Dynamically test and prioritize for code scanning and software composition analysis. We find vulnerabilities in open source code in most applications since 80% of apps may be open source code off the shelf. Don’t incorporate libraries with known vulnerabilities. You have to manage applications in the field because the threat space is changing and hackers can discover vulnerabilities in the packages your applications are already using. You have to manage known vulnerabilities into the future. Subscribe to a threat intelligence service, track all open source code used, and refresh those with known vulnerabilities.
Proper hygiene is important and effective at the application level whether internet facing or corporate facing infrastructure. Encryption, DLP, IDS but also prepare for the when. Security posture is only as strong as the number of blind spots you have. Need to see what’s in AWS and Office 365. You’ll need a comprehensive view of the entire infrastructure. Data is the ability to get access to an organization. Understand where the users reach. Is where they are going safe?
Show customers what they can do now to provide the best ROI for their security investment. Customers need awareness to what they post outside of their network and how to monitor it. Need established security processes, policies, and authentication. If you have a proper understanding of security policies and procedures you have what you need to counter most attacks.
Standardization and visibility have emerged as important traits of any kind of security structure. There simply aren’t enough time or resources to have one person or team create security for the entire business. Instead, organizations need to adopt an API-led connectivity approach, which defines methods for connecting and exposing assets with APIs. These APIs provide well-defined entry points and exit points to organizational data and assets and ensuring that standards for authorizing, authenticating, securing and sharing data, etc. are documented and shared broadly across teams. And the APIs themselves also contain reusable fragments (e.g. security schemas) that once verified by security teams can be shared and reused across the organization.
To read more techniques from security experts, continue the article here.