You can't secure what you don't acknowledge.SM

Thursday, August 10, 2017

Rapid7's Insight platform provides focused analytics for your security program

Fairly recently, Rapid7 took their vulnerability management platform up to the next level with their analytics platform called Rapid7 Insight. It's a beneficial for an independent consultant like myself and even more useful for enterprises with IT environments of growing complexity. Rapid7 Insight is marketed as a way to bring together the Nexpose vulnerability research, Metasploit exploits, global security intelligence and exposure analytics into a single system that can help businesses solve more - and better - security problems. 

A cloud tool that integrates with your Nexpose instance, Rapid7 Insight lets you see what's being uncovered in your environment, monitor specific vulnerabilities, and bring it full circle with ticketing system integration to support remediation workflows. you even have a choice on where to store your data in the cloud in order to meet specific compliance/legal requirements. Here are some examples of Insight's "Liveboards" that provide info on specific areas of vulnerability management. These are external-facing security vulnerability data including details on exploitable vulnerabilities.

Being able to run a tool such as this can add tremendous value to security testing and vulnerability remediation programs. This level of detail can show you exactly where you need to focus your efforts in order to expedite remediations and ensure returns on your security efforts. Hint: getting your patching under control, once and for all will likely be front and center. This information is good for sharing with executive management and can also help you prioritize your efforts that involve security policy development, user awareness and training, incident response and other core areas of security that need attention.

Rapid7 Insight, nor any other tool, is going to fix all of your security will at least set you on the right path. The discipline required to see things through is totally up to you.

Monday, August 7, 2017

How to gain control & become an IoT security expert

You've no doubt heard the vendor spiels and seen their solutions for gaining control of your Internet of Things environment. But do you truly have IoT under control? Like other things in IT, it can be pretty overwhelming, especially when you're struggling to keep your arms around your traditional network environment with cloud and mobile and all the complexities they bring. 

Well, IoT security doesn't have to be that difficult. It's complicated in terms of a well-run security program but, in many ways, there's really nothing new...I can assure you that if you step back to look at the bigger picture of what's going on with IoT security, from vendor marketing overload to understanding your network to fixing the basics, you can (and will) gain control of IoT if you take a measured approach. 

Here are several pieces I've created on IoT security that can help you in your endeavors:

Integrating the IoT into your application security program

Getting Ahead of the IoT Security Curve (an ISACA/TechTarget webinar)

Don't overlook this key element in securing the Internet of Things

Is Your Security Program Ready for the Internet of Things?

IoT at RSA brings a new focus on old problems

Securing the Internet of Things

Top cybersecurity trends for the first half of 2017

I hope this helps. Don't hesitate to reach out to me if you're ever in need of IoT security testing or strategy consulting. Cheers!