EDITOR’S QUESTION
reduce outbreak exposures. Adopting
next-generation endpoint process
Monitoring tools
Accessing timely, accurate threat
intelligence data and processes that allow
for that data to be incorporated into
security monitoring and eventing
Performing deeper and more
advanced analytics
Reviewing and practicing security
response procedures
Backing up data often and testing
restoration procedures, processes that
are critical in a world of fast-moving,
network-based ransomware worms and
destructive cyber weapons
Reviewing third-party efficacy testing of
security technologies to help reduce the
risk of supply chain attacks
Conducting security scanning of
microservice, cloud service, and
application administration systems
Reviewing security systems and exploring
the use of SSL analytics, and, if possible,
SSL decryption
Defenders should also consider adopting
advanced security technologies that include
machine learning and artificial intelligence
capabilities. With malware hiding its
communication inside of encrypted web
traffic, and rogue insiders sending sensitive
data through corporate cloud systems,
security teams need effective tools to
prevent or detect the use of encryption for
concealing malicious activity.
www.intelligentcio.com