This week in the news no excuses to go Phish yourself, a services vendor helps you identify risk, the #1 privileged identity management solution (According to some), and a huge blow to the Endpoint Security Agent market. And we'll talk about how to secure your SDLC. All that and more so stay tuned!
- http://www.eweek.com/security/are-you-at-risk-from-phishing-attacks-try-phishing-yourself.html - Go figure, users clicked links, however this is a free service. There is no excuse not to Phish yourself.
- https://www.equities.com/news/vectra-networks-discovers-critical-microsoft-windows-vulnerability-that-allows-printer-watering-hole-attacks-to-spread-malware - This was for our other show.
- https://www.equities.com/news/risksense-receives-fastest-growing-company-award - Services only, no product, interesting eh?
- http://marketcheetah.com/2016/07/08/independent-research-firm-cites-beyondtrust-as-a-leader-in-privileged-identity-management-report/ - According to Forrester, they are #1. Does this mean they are right for you? maybe, maybe not.
- https://www.skyhighnetworks.com/cloud-security-blog/does-cloud-security-require-another-endpoint-agent/ - This is not good for the Endpoint Agent market: Among IT professionals who have been involved in an agent deployment, 100% report they have experienced at least one significant issue
- http://www.prnewswire.com/news-releases/tufin-integrates-with-cisco-aci-to-deliver-application-centric-security-policy-management-300298768.html - This sounds complicated: integration of the Tufin Orchestration Suite™ with Cisco® Application Centric Infrastructure (Cisco ACI™) to deliver unified security policy management across physical and public, private and hybrid cloud networks. This integration enables customers to centrally manage application security policies from behind a single pane of glass.
- http://www.pressreleaserocket.net/sqrrl-security-technologist-creates-open-source-threat-hunting-repository/470153/ - This is really just a collection of techniques that link to previously published blog posts...
Securing The SDLC
Here is Paul's 5-Step process for a secure SDLC:
- Do threat modeling, train the architects, developers and security team in the process
- Do static analysis, train the developers to fix vulnerabilities as they go
- Do dynamic analysis, train the QA team to find vulnerabilities
- Do RASP (Runtime Application Self-Protection), train software to protect your application
- Do conduct external 3rd party application penetration tests