Securing Embedded Systems on the Internet of Things

Embedded systems, the Internet of Things and security. What do these things have in common?

Once in use industrial, medical, avionics and other systems typically don’t get upgraded, but they need to operate in a safe and trusted manner. But in the world of the Internet of Things where new, creative offerings are quickly hitting the market, security often is just an afterthought.

securitycurrent’s Vic Wheatman speaks with Senior Technical Marketing Engineer Roman Romaniuk of Winder River, a provider a of secure operating systems that are also in use on the planet Mars, as you’ll in hear in this podcast. The podcast was conducted at the Gigaom Structure Connect conference in San Francisco.



Overcoming Security Silos

The drumbeat of breaches — Home Depot, Target, Jimmy John’s and the list goes one — continues almost daily. Why is this the case? It doesn’t appear to be a lack of security investment or governance.

As you’ll hear from one former Gartner analyst who has ‘gone over to the dark side,’ a key problem is that individual security functions largely exist in isolated silos. Eric Ouellet, who is now VP of Strategy at Bay Dynamics, says this approach leads to data overload for security analysts causing fatigue and subsequently inadequate responses to attacks.

Ouellet tells securitycurrent’s Vic Wheatman that traditional approaches have flaws and generally lack the correlation of threat information from one silo to the rest, which would support holistic responses.



Threat Intelligence. What is It? How is it Used?

Threat Intelligence is more than just a list of bad actors’ IP addresses. The best sources of threat intelligence tend to be the more mature and ‘enlightened’ providers who employ a substantial number of security analysts who can evaluate the nature of the threats.

In fact, some are able to drill down not only to specific groups of threat actors or countries that may be after an organization but to the specific people who may be out to get them as well. But how do most organizations use this information and what kind of threat intelligence would help you the most?

It is often law enforcement that finds evidence of a security breach first. Being able to respond effectively to breaches can reflect on an organization’s reputation.

securitycurrent’s Vic Wheatman discusses these topics with Gartner Research Vice President Dr. Anton Chuvakin.



Data Loss Prevention Use Cases

Data Loss Prevention (DLP) solutions help keep private data private. Using various rules based on certain policies, sensitive information can be prevented from being exfiltrated.

But CISOs are walking a fine line. They must be careful not to inhibit user and business processes lest there be dire business consequences.

securitycurrent’s Vic Wheatman speaks with ex-Gartner analyst Eric Ouellet, who is now Vice President of Strategy at Bay Dynamics, about how DLP actually works and where it can be used.



History of Malware and How Privacy Gets No Respect

Malware in its various forms has been around since the start of the computing age, but one platform remains more susceptible to evil code than others with more than 1 million new unique virus  signatures discovered each and every day, according to F-Secure.

Also according to F-Secure’s Threat Strategist David Perry, it is “primarily a Windows world attribute.” However, the concerns are shifting with the proliferation of mobile. And just as the Internet offers little native security, it also does not respect privacy.

In this entertaining and humorous exchanged recorded at Black Hat, securitycurrent’s Vic Wheatman and David Perry discuss these and other issues.



Security Incident Response and the Lack of Sleep

It is often law enforcement that finds evidence of a security breach first. Being able to respond effectively to breaches can reflect on an organization’s reputation.

There is always malware running somewhere. Some enterprises have Security Response Teams, but many do not. If it is a one-man shop should they be a ‘doer’ or a ‘coordinator?’ If it is a large team, how should it be structured? What is the role of third parties and can open source tools be used?

securitycurrent’s Vic Wheatman speaks with Gartner Research Vice President Dr. Anton Chuvakin on this business critical issue.



Do Honeypots Still Have Value in Network Security?

Honeypots, used to detect cyber attacks, have been around information security for a long time.

The non-profit Honeynet Project is dedicated to investigating the latest attacks and working to improve the utility of honeypots in today’s changing network environment.

In this podcast Vic Wheatman speaks with Gartner VP of Research Dr. Anton Chuvakin about this sticky issue. They look at the benefits of Low-interaction honeypots, which simulate only the services frequently requested by attackers, versus High-interaction honeypots that imitate the activities of the production systems that host a variety of services.


Raytheon’s Perspective on Commercial Information Security Projects

Why should a commercial entity consider a defense contractor for security projects? Answering the question is Edward Hammersla, President of Raytheon’s Trusted Computer Solutions, Inc.

Hammersla provides perspective on the role of trusted operating systems, the ways of protecting data in a highly sensitive bring your own device (BYOD) environment and the appeal of using the term “cyber” in describing today’s approaches to information security.

Hammersla was speaking with securitycurrent’s Vic Wheatman.


Attack Intelligence, Big Data and the X-Ray Machine that Could Hack

Black Hat Series

There are a multitude of threat data sources used by Intrusion Prevention Systems (IPS) and anti-malware products to strengthen enterprise protections. Differentiating in this competitive almost commodity service market is a matter of numbers.

securitycurrent’s Vic Wheatman speaks with Jeff Harrell, Sr. Director of Product Marketing for Norse, a threat intelligence company that offers an appliance it says is designed to detect and defend against attacks from “darknets” as well as other Internet-based attacks.

They talk about this saturated market and Harrell discusses the x-ray machine that was used to verify the validity of stolen credit cards.


Yale New Haven Health System — A Real-World Case Study

With an increase in cyber attacks across industries, and in particular healthcare with medical-related identity theft accounting for 43 percent of all identity thefts reported in the United States last year according to the Identity Theft Resource Center, managing risk has never been more pressing for organizations.

With risk growing daily and the consequences — both in terms of data loss, patient and employee confidence and potential fines — looming large, one healthcare organization that takes cyber security seriously is Yale New Haven Health System.

Steve Bartolotta, who heads the health system’s information security and risk management program talks about the challenges facing organizations today across verticals and what measures he recommends taking.

In this podcast with securitycurrent’s Vic Wheatman, Bartolotta talks about the actual tools he uses to support Yale New Haven’s risk management system and what he has gained. Or you can read about it too by clicking here.