Thursday, June 1, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Leveraging SOAR for Enhanced Industrial Security | by Binu Panicker | Feb, 2023

Researcher by Researcher
February 7, 2023
in Cybersecurity
0
Leveraging SOAR for Enhanced Industrial Security | by Binu Panicker | Feb, 2023
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


As industrial organizations face more sophisticated cyber threats, they must improve their security posture to stay ahead of the attackers. Security orchestration and automation can help by consolidating security tools and processes, and automating repetitive tasks. This approach can help reduce the workload of security teams, and improve the efficiency and effectiveness of security operations.

In recent years, cyber threats have come at organizations from many directions. Attackers may try to gain access to systems manually or through bots, but they’re also able to exploit vulnerabilities in embedded devices, such as sensors and meters. To protect sensitive data and critical services, security teams must quickly identify and address these vulnerabilities.

The role of security teams is changing to address this new threat landscape. Rather than being focused solely on prevention, security teams are now responsible for identifying and monitoring access to systems and sensitive data once attackers have gained a foothold. To effectively perform this security monitoring function, they must aggregate and analyze large volumes of security data. They must also quickly identify and respond to emerging threats. Automating security tasks can help reduce the strain on security teams, allowing them to focus on more advanced and challenging work.

Security orchestration and automation

Security orchestration integrates security tools and processes in a coordinated way to address an organization’s specific security needs. Orchestration allows security teams to automate repetitive tasks, such as configuring, monitoring, and updating security configurations for devices from multiple vendors. By handling the details of these tasks, orchestration can make security processes more efficient and help address security gaps more quickly. For example, an organization with multiple vendors’ devices might have security tools that are incompatible with each other. Orchestration can help secure these devices by bridging these gaps, which allows the security team to securely operate the entire infrastructure.

While orchestration can greatly improve security, it should be done carefully. With some having vendor lock-ins and compatibility issues, integrating security tools and systems from multiple vendors may not always be feasible. In such cases, it may be better to maintain independent clouds for security monitoring and automation and use an orchestration engine to interface with these clouds as necessary.

Automation, a subset of software-defined technology, enables software or systems to perform tasks without the involvement of a human being. Security automation involves using software to monitor, detect, respond to and recover from security incidents. With automation, security teams can reduce the time it takes to respond to security incidents and bring them down quickly.

For example, if a network intrusion detection system detects a malware infection, automation could disallow access to the infected device and send a notification to the security team. While the security team gears up to address the incident, automation could also quarantine other devices at risk of infection and update security controls.

While automation can help security teams address incidents more quickly, it also presents a danger if not implemented properly. For example, if a security team deploys an automated response for a malware infection that blocks access to infected devices, but does not update the configuration later on, the affected devices could end up being locked out permanently. Because of this, security orchestration ensures that automated systems and tools are configured and operate as intended.



Source link

Related articles

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
Tags: BinuenhancedFebIndustrialLeveragingPanickersecuritySOAR
Share76Tweet47

Related Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
0

Threat actors are exploiting a critical-severity Zyxel flaw in order to add vulnerable devices to a Mirai botnet variant. While...

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
0

Cisco on Wednesday announced that it’s acquiring California-based cybersecurity firm Armorblox for its artificial intelligence (AI) technology. Armorblox specializes in...

8 best practices for securing your Mac from hackers in 2023

8 best practices for securing your Mac from hackers in 2023

June 1, 2023
0

Best practices for securing your Mac against potential hacks and security vulnerabilities include enabling the firewall, using strong passwords and...

ZuoRAT Malware Found Hitting Home Routers

New SeroXen RAT Emerges | Decipher

June 1, 2023
0

Security researchers are tracking a new fileless RAT named SeroXen that has the capability to evade many EDR systems and...

Sentra Raises $30 Million for DSPM Technology

Chrome 114 Released With 18 Security Fixes

May 31, 2023
0

Google this week announced the release of Chrome 114 to the stable channel with a total of 18 security fixes...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup /

June 1, 2023

Recent Posts

Spring Framework Flaw Exploited in Mirai Malware Attacks

Threat Actors Exploit Critical Zyxel Flaw in Botnet Attacks

June 1, 2023
All eyes on APIs: Top 3 API security risks and how to mitigate them

All eyes on APIs: Top 3 API security risks and how to mitigate them

June 1, 2023
Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

June 1, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved