Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    Key Advice for Improving Your Company’s Cybersecurity

    Best practices in cybersecurity include robust threat modeling, participating in community engagement, and using ethical hackers to find vulnerabilities.

    By
    eWEEK EDITORS
    -
    April 13, 2022
    Share
    Facebook
    Twitter
    Linkedin
      enterprise infrastructure

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Security continues to be an evolving challenge for organizations around the world, and new threats and vulnerabilities are putting increased pressure on vendors to improve their cybersecurity profiles. Customers, governments, and organizations are more likely to inquire about the security of a company’s products and processes than ever before. 

      And while no single tactic, practice, process, or technology can guarantee security, it’s important to begin implementing or upgrading basic practices to improve security infrastructure. But this can be a daunting task, especially when it comes to product assurance.

      To help, here is some practical advice for companies looking to create or improve their cybersecurity profile.

      Also see: The Successful CISO: How to Build Stakeholder Trust

      Improving Your Cybersecurity Profile

      Over the last several years, security has played an increasingly crucial role in the product development lifecycle (PDL). As a result, developers, engineers, and product teams are now focusing intently on creating secure products.

      When it comes to product assurance, there are three major areas—integration, automation, and community engagement—to focus on when working to improve a company’s cybersecurity profile.

      Integrate Secure and Product Development Lifecycles

      Integration is key during product development. But today, many organizations do not integrate the product development lifecycle with the secure development lifecycle (SDL).

      There is a movement to shift security earlier in the lifecycle from operations toward development to help discover and prevent vulnerabilities. This can include a lifecycle prior to the one a company is adding value to.

      In cases where third-party hardware or software is not scrutinized, vulnerabilities can be harder to discover but also more broadly distributed, which can make them harder to remediate. For example, the Equifax breach in 2017 was reported to be the result of a vulnerability in open-source software. And more recently, the world reacted to another open-source vulnerability in Log4j.

      Designing products with security in mind from the very beginning and demanding transparency in security practices from vendors is a good place to start when improving security.

      Include Robust Threat Modeling

      Include robust threat modeling at the beginning of the development process. As a part of that process, understand what is most valuable to the customer and how that could come under threat.

      Create use cases but also train developers to think like a hacker to assess dangers in unintended usages. In addition, set up checkpoints that a product must pass through to progress to ship ready.

      This will not work without buy-in from executives across the company, so it’s usually a good idea to recognize that there will be requests for waivers and to assign an escalation path up front that includes product and security executive sign-off.

      Ultimately, PDL and SDL should merge into a single process, including elements from security, privacy, functionality, and quality.

      Also see: Secure Access Service Edge: Big Benefits, Big Challenges

      Train Staff on Product Security Basics

      Train all developers and engineers in the basics of product security, and make sure they understand that security is part of their job. Also, let them know that there are experts available to help them.

      If a company can’t dedicate a security professional to each product team, it should consider training and designating “security champions” that can help product teams stay on top of security best practices and tools. These champions can also help maintain consistency of expectations across a company’s portfolio. While today this role is often a side job, expect it to become more common as a full-time position in the future.

      Automate Threat and Vulnerability Detection

      Automation offers tremendous value when properly applied to security assurance. It allows product teams to check for known vulnerabilities while lightening the load on engineers.

      Scanning code manually can be laborious. Automation streamlines and accelerates the process of finding threats and vulnerabilities. Consider the following:

      • Start by examining your own code for errors. Many off-the-shelf static analysis tools can scan code for patterns that represent likely vulnerabilities that developers may miss, such as buffer overflows, integer overflows, or arithmetic errors.
      • Next, check third-party components for known vulnerabilities using composition analysis tools.
      • Then, invest in cybersecurity tools that check against publicly disclosed vulnerabilities such as scanners and fuzzers. While it may be tempting to start with advanced tools, it’s usually best to start simple and build up to the more advanced features when needed. There are several off-the-shelf and open-source scanners and fuzzers available.

      Participate in Community Engagement

      The final area of advice is around community engagement. No organization should act in a silo. The security community includes standards bodies such as the National Institute of Standards and Technology (NIST), the Trusted Computing Group (TCG), and the International Standardization Organization (ISO).

      The research and academic communities are also key partners in the fight against cyber threats. Even the U.S. Department of Defense invests in “Hack a Satellite,” where they let security researchers hack live satellites.

      Community engagement is about building relationships. When it comes to coordinated vulnerability disclosures, create a framework that supports ensuring the timely publication for academics, and consider compensating vulnerability findings that are accurate. The compensation can be monetary or nominal (e.g., t-shirts). 

      Other areas of community engagement you should consider include:

      Creating a Product Security Incident Response Team

      Establish processes for receiving and managing vulnerability reports. Product security incident response teams (PSIRT) can manage the entire process from discovery through triage, mitigation, and disclosure.

      A PSIRT will be made up of people who are adept at understanding complex technical approaches from engineers or developers as well as communicating with customers and other members of the ecosystem.

      Ideally, a single PSIRT member will monitor an issue from the first report through disclosure. For ideas on how to get started, check out the PSIRT Services Framework.

      Encourage Ethical Hackers to Help Find Vulnerabilities

      Organizations that have a mature vulnerability disclosure program should encourage ethical hackers to help find vulnerabilities. This can begin with a generic email address for submissions. To make this process more accessible, create a Web address with specific instructions and supporting information about how to report these vulnerabilities.

      State-of-the-art approaches include creative events like hackathons or capture the flag contests where individuals or teams seek vulnerabilities on a timeline. 

      Also see: Best Website Scanners 

      Conclusion

      Organizations around the world are working to improve their cybersecurity profiles to deliver better products and meet obligations around social responsibility. Companies like Microsoft, Salesforce, and Google are setting great examples. This practical advice is just the tip of the iceberg when it comes to steps organizations can take to improve security assurance across product teams – but they are a great place to start.

      About the author: 

      Camille Morhardt, Director of Security Initiatives for Security Center of Excellence at Intel

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      10 Best Artificial Intelligence (AI) 3D Generators

      Aminu Abdullahi - November 17, 2023 0
      AI 3D Generators are powerful tools for creating 3D models and animations. Discover the 10 best AI 3D Generators for 2023 and explore their features.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×