Cmd.com will be migrated to Elastic.co shortly.
By: Thaddeus Walsh
This blog series is written for security professionals whose security posture is moderate to high. Even those companies who have the basics in security covered can run into security challenges between digital transformation, cloud, or Linux environments. In this blog series, we’ll address a few we see from our customers and prospects. The first installment will focus on asymmetry.
Why do well-funded and well-run organizations fall victim to cyber attacks? A small number of asymmetric relationships are at the core of all failures in cybersecurity. You are intuitively aware of each of these relationships, and it’s likely that you’ve never directly thought about some of these asymmetries before. Considering these relationships directly will help contextualize all of your decisions related to cybersecurity throughout your digital transformation journey.
Asymmetric: Having parts or aspects that are not equal or equivalent; unequal
Relationship: The way in which two or more concepts, objects, or people are connected, or the state of being connected
There are three considerations to make with regards to asymmetry:
To tie back to the original question, Why do well-funded and well-run organizations fall victim to cyber attacks? It’s not because they have weak talent or the wrong tools, rather, it’s due to these asymmetries that can intersect and overlap to create unwinnable situations for the security team.
The next blog in this series will address how Security Program Leaders can hack these asymmetries to transform the way they secure their organizations’ technology applications and infrastructure.
Stay tuned for the next blog. If there is a topic you’d like us to cover, let us know at marketing@cmd.com.
Ramp up your Linux defense strategies
and see what you've been missing.