IT - Security

Those of us who read a lot of tech and business publications have heard for years about the cybersecurity skills gap. Studies often claim that millions of jobs are going unfilled because there aren't enough qualified candidates available for hire.

"I don't buy it.

The basic laws of supply and demand mean there will always be people in the workforce willing to move into well-paid security jobs. The problem is not that these folks don't exist. It's that CIOs or CISOs typically look right past them if their resumes don't have a very specific list of qualifications.

In many cases, hiring managers expect applicants to be fully trained on all the technologies their organization currently uses. That not only makes it harder to find qualified candidates, but it also reduces the diversity of experience within security teams - which, ultimately, may weaken the company's security capabilities and its talent pool..."

The Coveware Quarterly Ransomware Report describes ransomware incident response trends during Q1 of 2021

"Data exfiltration extortion continues to be prevalent and we have reached an inflection point where the vast majority of ransomware attacks now include the theft of corporate data. Q1 saw a reversal of average and median ransom amounts. The averages in Q1 were pulled up by a raft of data exfiltration attacks by one specific threat actor group that opportunistically leveraged a unique vulnerability (more on this below)..."

A comprehensive identity security approach based on privileged access management must focus on securing individual identities - regardless of whether it is a person or a machine

"The increasing use of cloud services and automation solutions or even the switch to remote work has made identity the new perimeter security. With the ever-expanding attack surface, identity management has become critical for maintaining a robust security posture. Beyond privileged access management (PAM), an identity security strategy is the next logical step to protect the company against cyberthreats..."

As a technology vendor, your number one goal is to provide the best service possible to your customers

"The enterprises you support likely rely on you for pretty critical business functions, like operating machinery or storing confidential patient or client information. You're a large part of why an enterprise can operate on a daily basis; essentially, your success is their success.

So, as a technology vendor, it's understandable why your number one concern is any issue that could disrupt the service you're providing to your customers. You promised quality work. You promised return on investment. You promised secure services that wouldn't negatively impact your customers. When it comes to your business, you know you'll do whatever it takes to make sure you come through on those promises. After all, it's not just your customers you're looking out for: It's also your staff, their work, and their security you need to keep in mind..."

Good communication, mutual understanding of each team's goals, and proper processes and infrastructure will ensure an effective working relationship between cloud and security teams

"Better collaboration between cloud engineers and security teams should grow naturally with cloud maturity. You want to get past security being seen as the 'department of no' by the cloud team. Such efforts need to come from management and the teams themselves through old-fashioned relationship building, data sharing, and other cross-team efforts. With a little proactivity and cross-team communications, you can break down traditional silos to ensure both teams can best support the other when a breach occurs.

Here are some tips on how to improve collaboration between cloud engineers and cybersecurity teams:..."

No, not the US government's task force ... the other one

"The Institute for Security and Technology's Ransomware Task Force (RTF) on Thursday published an 81-page report presenting policy makers with 48 recommendations to disrupt the ransomware business and mitigate the effect of such attacks.

The RTF, formed last December and populated by representatives from companies like Microsoft, Palo Alto Networks, and Rapid7, and government organizations like the FBI and US Secret Service, has nothing to do with the RDETF, or Ransomware and Digital Extortion Task Force, assembled last week under the auspices of the Justice Department. However, the RTF and RDETF can be expected to cross-pollinate one another..."

See all Archived IT - Security articles See all articles from this issue