{"id":434,"date":"2017-02-11T21:04:28","date_gmt":"2017-02-11T20:04:28","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=434"},"modified":"2017-02-11T21:04:28","modified_gmt":"2017-02-11T20:04:28","slug":"going-to-rsa-2017-watch-out-for-the-sandman","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/02\/11\/going-to-rsa-2017-watch-out-for-the-sandman\/","title":{"rendered":"GOING TO RSA 2017?-WATCH OUT FOR THE SANDMAN"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"  wp-image-435 aligncenter\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/aaeaaqaaaaaaaatjaaaajgfkzwzhmte3lwfkntktndlhyi04mdu3ltrjote2m2qwmgqznq.png\" alt=\"aaeaaqaaaaaaaatjaaaajgfkzwzhmte3lwfkntktndlhyi04mdu3ltrjote2m2qwmgqznq\" width=\"730\" height=\"418\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/aaeaaqaaaaaaaatjaaaajgfkzwzhmte3lwfkntktndlhyi04mdu3ltrjote2m2qwmgqznq.png 557w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/aaeaaqaaaaaaaatjaaaajgfkzwzhmte3lwfkntktndlhyi04mdu3ltrjote2m2qwmgqznq-300x172.png 300w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-438\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin.jpg\" alt=\"going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin\" width=\"393\" height=\"62\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin.jpg 393w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin-300x47.jpg 300w\" sizes=\"(max-width: 393px) 100vw, 393px\" \/><\/p>\n<h3>Future -Robots will fight your cyberwar<\/h3>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAp5AAAAJGEyYzNlYTk2LThiNjAtNDNjOC1iNmJmLTU5MDliYWQ1ZjFjMg.jpg\" width=\"420\" height=\"305\" \/><\/p>\n<p>How becoming cyber resilient is going to be writing more rules and even introducing even more technology in organizations where whole IT security departments are battling and chasing cyber bots .\u00a0The\u00a0owners of these bots \u00a0are lying in their hammock with a cocktail waiting on another victim they can add to their revenue towards<a href=\"http:\/\/www.cybersecurity-review.com\/cybercrime-will-double-by-2021-with-an-annual-profit-of-6-trillion\" target=\"_blank\" rel=\"nofollow noopener\"> 6 trillion.<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAArhAAAAJGYwOWU5NzdkLWNjNWUtNDc5Yy05MDRmLTBjNTg0Yjg2NDkzOQ.jpg\" width=\"640\" height=\"426\" \/><\/p>\n<p>Study: 51% of Internet traffic is from bots, 31% is\u00a0harmful.<\/p>\n<p>So we need to stop the bad guys (girls?) to abuse our known vulnerabilities through bots since we need to become secure to avoid costs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAsmAAAAJDI0YjZjZGVjLTQ5MGEtNDIyYi05MTBmLWE2NmIyMjNlYmU1Mg.jpg\" width=\"600\" height=\"413\" \/><\/p>\n<p>Buying a solution that will stop these will have definitely have your preference. Of course this will depends \u00a0on how you need to become #incontrol.<\/p>\n<h3>Players on the market<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAqjAAAAJDFkN2JjMzJhLTg4NTUtNGUyNS1iMGEzLTA1ZTZhOGRlOTUyOQ.png\" width=\"640\" height=\"678\" \/><\/p>\n<p>As we go to RSA to see these reactive technology born out of a need since like pre-funeral planning most people don\u2019t want to think about or talk about cyber breach prevention or compliancy.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAnfAAAAJDViYmU0MmQ1LTU5MmYtNGRlMy05NDJkLWViYzBjYTc0MTQzYw.png\" width=\"640\" height=\"452\" \/><\/p>\n<h3>Sunny side up<\/h3>\n<p>So we are going to trade shows where the first question will be \u201cwhat are we searching for?&#8221;<br \/>\nInstead of just putting cybersolutions IDS, IPS, antimalware, phissing awareness courses and then buy cyber insurance that on itself need new &#8220;innovations&#8221; since there are no visionaries according to #Gartner.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAA1wAAAAJDA3ZTk1OWUxLTk2YjItNDIzZi1iMjVjLTNiOTEzMDNlNGRhNg.png\" width=\"640\" height=\"657\" \/><\/p>\n<p>ITS HUGE ITS ENORMOUS ITS TRUE<\/p>\n<p>This fuels the industry to enhance the current\u00a0reactive defences by adding new capabilities that are alien to these products like Artificial intelligence <strong>1<\/strong>\u00a0to battle the complexity of humans need to interpreted the onslaught of alerts . And the lack of cyberexperts <strong>5<\/strong> \u00a0that are breeded by the demand for &#8220;fighterpilots &#8221; since we put everything in the cloud and find out that also that technology comes with perils even though you outsourced your business processes.. <a href=\"http:\/\/www.cityam.com\/248334\/eye-eye-hack-hack-global-cyber-arms-race-heating-up\" target=\"_blank\" rel=\"nofollow noopener\">http:\/\/www.cityam.com\/248334\/eye-eye-hack-hack-global-cyber-arms-race-heating-up<\/a><br \/>\nRSA 2017 will be full of it , its true ,its enormous and they will build all of that for you at premium prices with American technology ofcourse <a href=\"http:\/\/www.crn.com\/slide-shows\/security\/300083720\/10-security-trends-to-watch-for-at-rsa-2017.htm\/pgno\/0\/5\" target=\"_blank\" rel=\"nofollow noopener\">10 security trend to watch for at rsa 2017.<\/a><br \/>\nAnd that technology at the moment fails , but why?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAyXAAAAJGZmZDgwOTU0LTZmOTItNGJjOC04ODBlLTZkOWNlYmY3MjUxYQ.jpg\" width=\"640\" height=\"514\" \/><\/p>\n<h3>Point of no return<\/h3>\n<p>So we need more technology to protect the technology that protects our assets -huh? But in the mean time configuration errors, malicious insider not stopped by reactive deflection software and phishing techniques stacked upon the &#8220;old firewall and antivirus&#8221; clubs and the complexity add up for 98% of the breaches .<\/p>\n<p>This\u00a0is the situation \u00a0with the current market leaders where bluecoat was once was one \u00a0of them .<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAoLAAAAJDg0N2M1NTRkLWE0YjctNDM1OS1iZmZiLTU2MTg1N2UwOGVkYw.png\" width=\"640\" height=\"638\" \/>And what do we see happening is that the small fishes get gobbled up by bigger fishes that get gobbled up by supreme whales without modifying or questioning the technology and ends up in governments and big fortune 500 companies without a sanity check since &#8221; we are protected&#8221; not knowing how it is protected in the total chain.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAw6AAAAJDA4MzkzNzM5LTFlYzctNDgzMC1iYjg5LTJmNTJjOWE3MWYxOQ.jpg\" width=\"499\" height=\"500\" \/><\/p>\n<p>What about hidden and visible costs when a breach occurs?<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAA23AAAAJDgyOTg5MDA5LWIwMzAtNGM0ZS1iNjBjLWU1Yzk1N2NjMzU2OA.png\" width=\"640\" height=\"615\" \/><\/p>\n<p><strong>So lets put that in perspective :<\/strong><\/p>\n<p>We spend $120 billion a year on cybersecurity , according to Gardner not on visionary product leaders so basically in the same old pool from usual suspects that have enough money to buy good companies but don\u2019t have the expertise to enhance or integrate it correctly due to reasons mentioned before.Not even taking into account the risk of foreign dependencies and\u00a0\u00a0the brain drain these companies have if the brightest are not\u00a0<a href=\"http:\/\/www.theverge.com\/2017\/1\/28\/14426550\/silicon-valley-trump-immigration-response\" target=\"_blank\" rel=\"nofollow noopener\">allowed into the country<\/a>&#8211;<\/p>\n<h3>Bluecoat history as a visionary<\/h3>\n<p>So in early 2015 we see that bluecoat is getting into a round of finance <a href=\"https:\/\/www.bluecoat.com\/company\/press-releases\/blue-coat-be-acquired-bain-capital\" target=\"_blank\" rel=\"nofollow noopener\">acquired by Bain Capital for $2.4 billion<\/a> . Even though flaws at the the time were presented by security researchers that weren\u2019t heard of<a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/03\/26\/hackers-slam-blue-coat-claiming-it-pressured-security-researcher-into-cancelling-talk-on-its-tech\/#3db80928659a\" target=\"_blank\" rel=\"nofollow noopener\">http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/03\/26\/hackers-slam-blue-coat-claiming-it-pressured-security-researcher-into-cancelling-talk-on-its-tech\/#3db80928659a<\/a><\/p>\n<p>Almost a year later Symantec then acquires bluecoat in june 2016 for <a href=\"http:\/\/www.crn.com\/news\/security\/300081535\/symantec-closes-acquisition-of-blue-coat-looks-to-begin-product-integration-strategy.htm\" target=\"_blank\" rel=\"nofollow noopener\">4.5 billion<\/a> and still introduce vulnerabilities Symantec, which recently <a href=\"http:\/\/fortune.com\/2016\/06\/12\/blue-coat-abandons-ipo-plans-sells-to-symantec-for-4-65-billion\/\" target=\"_blank\" rel=\"nofollow noopener\">purchased the Bain <\/a><a href=\"http:\/\/fortune.com\/2016\/06\/12\/blue-coat-abandons-ipo-plans-sells-to-symantec-for-4-65-billion\/\" target=\"_blank\" rel=\"nofollow noopener\">Capital-backed cybersecurity firm Blue Coat<\/a> for $4.65 billion, also employed open source code that it failed to update even after seven years of use, Ormandy notes. He lists the additional vulnerabilities in that code <a href=\"https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/list?q=label:Vendor-Symantec\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a>.<\/p>\n<p>Vulnerabilities were known before bain capital took it over were not fixed after an 2.5 billion injection because time to market was the only thing that counts and is currently at many governments in use..who say we only \u00a0need to <a href=\"https:\/\/www.theregister.co.uk\/2016\/12\/09\/institute_for_critical_infrastructure_technology_iot\/\" target=\"_blank\" rel=\"nofollow noopener\">regulate IOT devices <\/a>..<\/p>\n<p>We see more of these takeovers from those big-name vendors touting their acquisitions at the RSA show point http:\/\/www.crn.com\/slide-shows\/security\/300083720\/10-security-trends-to-watch-for-at-rsa-2017.htm\/pgno\/0\/2<\/p>\n<p>So the current visionairs can\u00a0undergo \u00a0the same faith as blue coat with you left behind in the cyberdust. Where time to market prevails while the products might still have flaws- making money while offering a false sense of security<\/p>\n<p>So the next offering approach with some sepsis and address your company cyber resilience how`s \u00a0needs first before getting in the turmoil of the what wants .<br \/>\nHave a good RSA fair and a good sleep without sand put into to your eyes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"center\" src=\"https:\/\/media.licdn.com\/mpr\/mpr\/shrinknp_800_800\/AAEAAQAAAAAAAAnSAAAAJDRiMGI4ZDIyLTE0MjctNGVmOS04MmY5LTc4YTFhNTBlOTk1OA.jpg\" width=\"640\" height=\"302\" \/><\/p>\n<p>My dear friend and valued colleague Mr.Peter Rus<br \/>\nChief Innovation Officer<\/p>\n<p>A visionary that can help your business community\u00a0how to set up support through\u00a0working together in\u00a0with \u00a0operation\u2019s based decisions regarding the kind of risks that exists and the response measures that need\u00a0to be initiated for safety and security to prevent risk events and mitigate the impact if the should occur.\u00a0\u00a0This knowledge \u00a0keeps industry, government and enterprises preventively #incontrol.<\/p>\n<p>P@ssport \u2013 we offer you the controls you need to protect lives .<\/p>\n<p>For more info we want to point you to our website <a href=\"http:\/\/www.cybersecurity.industries\/\" target=\"_blank\" rel=\"nofollow noopener\">www.cybersecurity.industries<\/a><\/p>\n<p>Or contact us directly on 0031 (0)70 7370471.<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\">Backoffice@cybersecurity.industries<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Future -Robots will fight your cyberwar &nbsp; How becoming cyber resilient is going to be writing more rules and even introducing even more technology in organizations where whole IT security departments are battling and chasing cyber bots .\u00a0The\u00a0owners of these bots \u00a0are lying in their hammock with a cocktail waiting on another victim they can &#8230; <a title=\"GOING TO RSA 2017?-WATCH OUT FOR THE SANDMAN\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/02\/11\/going-to-rsa-2017-watch-out-for-the-sandman\/\">Read more<span class=\"screen-reader-text\">GOING TO RSA 2017?-WATCH OUT FOR THE SANDMAN<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[25],"tags":[33,34,40,47],"class_list":["post-434","post","type-post","status-publish","format-quote","hentry","category-security","tag-compliancy","tag-cyber","tag-iot","tag-triple-a","post_format-post-format-quote"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=434"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/434\/revisions"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}