Go To Home
Schedule a 1:1 Demo

How to stop attacks – 5 ways Top CSOs do it

by Smokescreen Team

Leading companies are changing their approach to cyber-security.
Here are the top 5 ways successful CSOs stop attacks:

  1. Focusing on detection and response

    Preventive controls are ineffective against modern attacks that always find a foot in the door. Modern practitioners assume compromise has occurred, and build detection & response capabilities, instead of trying to plug every single loop-hole. Changing their mindset from prevention to detection is then perhaps the #1 way in which CSOs stop attacks.

  2. Making security alerts actionable

    In an average week, companies face 17,000 security alerts, most of which are false alarms that lead to real problems not being dealt with in time. CISOs are opting for technologies with very low false positives (less than 1% of alerts), freeing security teams to act on real threats instead of false positives.

  3. Increasing internal network visibility

    ‘Dwell time’ (how long an attacker is undetected in the internal network) is usually measured in months or years. Top security leaders are focusing on internal network visibility to reduce the dwell time to minutes and thwart attacks faster.

  4. Removing the human element in monitoring

    Analysts monitoring screens in shifts has proved ineffective as people can’t find suspicious patterns in huge volumes of security data. CISOs of leading companies now favour automated attack detection which reduces dependence on human analysts and lowers operational costs.

  5. Catching attacks early with threat intelligence

    Detecting an attack during the planning stage is incredibly powerful as it can be mitigated before it even begins. CISOs are setting up early warning systems to detect when they are targeted and give the security team the time advantage.

Sources: Analysis of targeted attacks in the last 3 years, surveys of C-level executives tasked with security, and 2014 – 2015 industry research reports.

#strategy

Continue Reading

  • The curious case of “How many decoys do I need?”

    Decoys can be deployed everywhere in your network – current-gen deception technology makes that possible. There are however no free lunches and pervasive deception might come with a cost. So the question is, should you?
    By Sudarshan Pisupati
  • Open Source Honeypots That Detect Threats For Free

    If you’re a target for either financially motivated cyber-criminals, or nation-state grade attackers, chances are your security team feels outgunned. Deception technology excels at detecting these attacks by shifting the cognitive, economic and time costs of the attack back onto the attacker.
    By Smokescreen Team
  • 7 Ways to Fail At Implementing Deception Technology

    Since there’s precious little information on how security teams can make deception implementations successful (some folks like to keep it a secret), there’s plenty that can go wrong. Here are 7 ways to completely botch your deployment of deception technology.
    By Smokescreen Team
  • Have you tried out IllusionBLACK yet?
    • Detect zero-days, APTs, and insider threats
    • 10x the detection capabilities with 1/2 the team
    • Get started in minutes, fully functional in hours
    Schedule a demo

    Smokescreen builds simple, no-nonsense products that security teams love. We help you predict attacks, detect breaches, and respond in real-time.