Can You Detect a Cyberattack?

Posted on

  • email
  • twitter
  • facebook
  • share this

share this


Tripwire has released the results of a study that evaluated the confidence of IT professionals regarding the efficacy of security control (including PCI DSS, SOX, NERC CIP, MAS TRM, NIST 800-53 and IRS 107) useful in detecting an in-progress cyberattack.

While a majority displayed high levels of confidence in their ability to detect a data breach, they were reportedly unsure how long it would take automated tools to discover key indicators of compromise.


 SUBSCRIBE to Website Magazine & Accelerate 'Net Success


For example, when asked how long it would take automated tools to detect unauthorized configuration changes to an endpoint on their organizations’ networks, 67 percent only had a general idea, were unsure or did not use automated tools. However, when asked how long it would take to detect a configuration change to an endpoint on their organizations’ networks, 71 percent believed it would happen within minutes or hours. Configuration changes are a hallmark of malicious covert activity.

“All of these results fall into the ‘we can do that, but I’m not sure how long it takes’ category,” said Tim Erlin, director of IT security and risk strategy for Tripwire. “It’s good news that most organizations are investing in basic security controls; however, IT managers and executives, who don’t have visibility into the time it takes to identify unauthorized changes and devices, are missing key information that’s necessary to defend themselves against cyberattacks.”

 

Login To Comment


Become a Member

Not already a part of our community? Sign up to participate in the discussion. It's free and quick.

Sign Up

Be the first to comment on this article

999 E Touhy Ave
Des Plaines, IL 60018

Toll Free: 1.800.817.1518
International: 1.773.628.2779
Fax: 1.773.272.0920
Email: info@websitemagazine.com

Facebook


Twitter