Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Cybersecurity Snapshot: 6 Things That Matter Right Now

Cybersecurity Snapshot: 6 Things That Matter Right Now -- July 29

Topics that are top of mind for the week ending July 29 | Boost your security awareness program. Why fire drills hurt security teams. A quick temperature check on attack surface management. Protecting smart factories from cyberattacks. And much more!

1. Struggling to fill cybersecurity jobs? Focus on folks starting out.

Cybersecurity hiring managers face intense competition for talent amid chronic staffing shortages. A new report from the (ISC2) offers hope, saying you can find strong candidates among the entry-level and junior-level crowd – those with under a year of experience, and with one to three years, respectively.

The report, based on a poll of 1,250 hiring managers, found that the cost to train these employees is reasonable and that they get up to speed fairly quickly. Even better, they contribute fresh perspectives, ideas, and skills in new technologies.

Snapshot #4 -- image 1

(Source: “Best Practices for Hiring and Developing Entry-Level and Junior-Level Cybersecurity Practitioners” report from (ISC2)

Recommendations from the (ISC2) include:

  • Don’t limit your search to the IT field. Look for people who are good at project management, customer service, problem solving, analytical thinking, and teamwork.
  • Get the job descriptions right. Partner with human resources to explain the job realistically and establish clear expectations.
  • Assign the right tasks to these new hires. Craft a workload that’s appropriate to their level of experience and that allows them to learn and grow on the job.
  • Offer them professional development opportunities. Provide mentorship programs, facilitate attainment of certifications and offer training.

To get all the details, read the full 21-page report “Best Practices for Hiring and Developing Entry- and Junior-Level Cybersecurity Practitioners.”

2. Here’s the top malware for June

The Center for Internet Security (CIS) recently released its top 10 list of malicious software for June, its most recent ranking. Here it is, in order of prevalence:

  1. Shlayer, a downloader and dropper for MacOS malware
  2. CoinMiner, a cryptocurrency miner family
  3. QakBot, a multifunctional banking trojan
  4. ZeuS, a modular banking trojan
  5. NanoCore, a remote access trojan (RAT)
  6. GravityRAT
  7. Gh0st, a RAT
  8. Agent Tesla, a RAT
  9. Mirai, a malware botnet
  10. RedLine, an infostealer

Snapshot #4 -- image 2

(Source: The Center for Internet Security)

To get all the details, context and indicators of compromise for each malware, read the CIS report.

3. Analyst to CISOs: End “fire drill” culture

It’s a chronic problem among many security teams: Spending most of their time responding to emergencies while devoting little time to strategic plans. Well, CISOs must extinguish “fire drill” mode once and for all, a cybersecurity analyst warns. 

Writing in CSO Magazine, Jon Oltsik from Enterprise Strategy Group admits he, too, had become “numb” to this perennial issue, until he pondered its dangerous implications, including:

  • Chaos reigns, causing stress, increasing complexity and decreasing efficiency.
  • Cutting corners inevitably becomes standard procedure.
  • Tribal knowledge, not proven processes, drive incident responses.
  • There’s poor preparation for newer types of attacks.

The good news? The solution isn’t rocket science. Common sense steps like improving security hygiene, segmenting networks and automating processes will go a long way. 

For more information about this topic:

4. Smart factories: A big target for hackers

Digitized smart factories are the future of manufacturing but their broad exposure to the internet makes them an increasingly popular attack target. Their security teams must up their game.

A recent Capgemini Research poll of 950 organizations’ smart factory cybersecurity found they are in general “inadequately prepared in terms of awareness, governance, protection, detection and resilience.” Yikes. 

Snapshot #4 -- image 3
In fact, respondents say, it’s common for cybersecurity analysts to feel overwhelmed by the myriad operational technology (OT) and Industrial Internet of Things (IIOT) devices they must track.

So how can these teams shore up their smart factories’ cybersecurity? Report recommendations include:

  • Perform an initial assessment, creating an inventory and tracking mechanism for all connected devices.
  • Build organization-wide awareness of cyberthreats, from top management to staff.
  • Identify clear risk ownership for cyberattacks.
  • Establish a governance structure that adheres to global protocols and regulations.
  • Tailor practices and frameworks for the smart-factory environment.

To get all the details, download the full 52-page report “Smart & Secure: Why smart factories need to prioritize cybersecurity” and view the accompanying infographic.

For more information about this topic:

5. A reality check on attack surface management

Check out these insights about attack surface management – the continuous discovery and identification of internet-facing assets that could be targeted by attackers – from attendees polled informally at a recent Tenable webinar.

Snapshot #4 -- image 4

(117 respondents polled by Tenable in July 2022)

Snapshot #4 -- image 5

(115 respondents polled by Tenable in July 2022)

Snapshot #4 -- image 8

(113 respondents polled by Tenable in July 2022)

For more information about attack surface management, check out these Tenable blogs:

6. Your weakest link? Hint: It’s not tech

And, finally, here’s a hard truth: The biggest threat to a company’s cybersecurity is – drumroll! – its staff. Yep, it’s the employees, not the technology. And that means one thing: You need a strong security awareness program. 

That’s the word from this year’s Security Awareness Report from SANS Institute. Here are some takeaways from the report, which polled 1,000-plus pros involved in security awareness programs:

  • To succeed, you need leadership support; enough staff (about 10% of the overall security team); and frequent employee security training (ideally monthly.)
  • Talk to leadership in terms of risk, not just about compliance requirements, explaining why – not what – you’re doing, and how this yields business benefits.
  • Closely collaborate with the larger security team, and partner with other teams, like communications and human resources.
  • Create a sense of urgency, documenting the importance of security awareness for reducing employee-caused incidents.
  • Have a metrics framework that tracks the program’s impact on the organization, and submit regular reports to leadership.
  • Seek to change not just people’s security behaviors, but also attitudes and beliefs.

For more information read the SANS Institute press release and download the full 17-page report.

More resources about building security awareness programs:

Related Articles

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Tenable.io Web Application Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable.io Container Security

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try Tenable Lumin

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable.cs

Enjoy full access to detect and fix cloud infrastructure misconfigurations and view runtime vulnerabilities. Sign up for your free trial now.

Contact a Sales Rep to Buy Tenable.cs

Contact a Sales Representative to learn more about Tenable.cs Cloud Security and see how easy it is to onboard your cloud accounts and get visibility into both cloud misconfigurations and vulnerabilities within minutes.

Try Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save.

Add Support