Global

859,327
Confirmed
42,326
Deaths
178,131
Recovered
Managed Service Providers (MSPs) And Managed Security Service Providers (MSSPs) Can Thrive In “Interesting Times”

Managed Service Providers (MSPs) And Managed Security Service Providers (MSSPs) Can Thrive In “Interesting Times”

Updated On:

Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs): In the realm of cybersecurity (‘May you live in interesting times!‘), interesting times can be both full of upheaval and change as well as optimistic opportunities for security service providers. For Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs), these are certainly interesting or not busy times. The cyber threat landscape is changing and expanding quite rapidly, making their services more critical than ever.

Enterprises in every industry are looking for these service providers for the resources, skills and expertise that they don’t have in-house or can’t find or afford to hire. For companies that offer the right kinds of security services and good value for the customer, opportunities abound.

new_releases

Internet of Things (IoT): Everything You Need To Know About IoT

From my perch as head of engineering for a secure platform company, I pay close attention to the cyber threats we all face. Maybe it’s the curse part of interesting times, but the threat landscape is changing quite rapidly, putting extra pressure on those of us who protect all types of businesses against these threats.

The primary reason for the rapid change in the threat landscape comes down to the attack surface getting ever bigger, which makes it much easier for attackers to “browse” around for a soft target and much harder for protections to span all assets. The burgeoning attack surface largely has to do with the voracious appetite that organizations have for taking their workloads off traditional infrastructures and putting them in the cloud.

Cloud computing has played havoc on traditional perimeter defenses and made it a real challenge to protect data when it’s no longer in the on-premise datacenter.

new_releases

Germany Move To Restrict Facebook’s Data Gathering Activities

What’s more, the threat landscape is only going to continue to expand as organizations bring millions of devices online via the Internet of Things (IoT).

Each “thing” grows the attack surface, and unfortunately, many such devices are poorly secured, making them very attractive targets for cyber attackers.

The Threat Landscape Is Changing, But So Is Managed Service Providers (MSPs) And Managed Security Service Providers (MSSPs)

The good news is that security tools vendors are always pushing the envelope to try to stay at least a step ahead of attackers with their ever-evolving Tactics, Techniques and Procedures (TTPs). Lately, the big trend has been toward “Machine Learning this…” and “AI that…” and it’s gotten to the point where ML/AI is table stakes for a good security tool that must learn from what it’s observing and adjust to match the attackers’ TTPs.

new_releases

Behavioral Biometrics: Securing Behavioral Traits, On Basis Of Behavioral Biometrics

Perhaps an even better trend of late is that cooperation among security tool developers is beginning to occur across the industry. As the head of a software engineering team, I have my sights set on how we can leverage the broader community as well as how we can contribute back in some way. The bad guys band together, so it’s time for the good guys to play as a team too.

What To Have In Managed Service Providers (MSPs) And Managed Security Service Providers (MSSPs)

The way to fight these cyber threats is with an effective security toolbox. Looking at the breadth of the security industry, the threat areas that must be covered, and the complexity of protecting enterprise environments, obviously, there is no “silver bullet” and you need a variety of tools.

Even more important than the tools themselves is the security model that companies use to protect their digital assets. The security industry has long preached that a “defense in-depth” or “layered security” model is what’s needed to protect an enterprise.

However, recent trends have shown that this model is outdated because it makes the assumption that companies must protect themselves from “the outside” and that internal people and systems can be trusted.

The increase in breaches (and very publicized breaches at that) indicates that perhaps it’s better to implement a security methodology that assumes that no one and nothing should be trusted.

new_releases

#HowTo Ensure Endpoint Security For Hybrid Cloud Security

This philosophy is largely outlined in the Zero Trust security architecture, which puts a perimeter around very specific applications, data, users and resources.

The Zero Trust security model is gaining adoption for specific needs – for example, very sensitive financial applications – but most companies today are still quite dependent on the layered security approach. That said, here are the kinds of tool categories that security providers should be advocating to their customers:

  • Validation of Authentication/Authorization – These tools require multiple forms of identification to gain access to assets and applications. Access should be restricted to the least amount of privilege possible.
  • Activity Logging – Companies should log everything that people, applications and other assets do and where they go. This audit trail of events is important in assessing normal and abnormal behaviors and when doing a forensic analysis of what has taken place on the network.
  • new_releases

    SecDevOps Need Is Evident, Your Cybersecurity Perspective Doesn’t Matter

  • Network Micro-segmentation – The finer the isolation of workloads, the easier it is to properly secure them by establishing what is and is not allowed to talk to assets and applications based on the workload.
  • Network Traffic Monitoring – Leverage NetFlow as a mechanism to truly monitor network traffic—what is communicating, how it is communicating, and when it is communicating. This information is crucial in being able to identify and understand normal behaviors in an environment versus something that is out of place.
  • Automation and Orchestration – This is a large bag of tooling; however, the purpose is fairly straightforward. Automation and orchestration ensure that solid DevSecOps practices are implemented as systems, software and configuration changes are being rolled into production.
  • new_releases

    Stealthy Crypto-Miner “Norman” Discovered By Security Analysts

  • Protection, Detection and Response – Assets, applications and data are what we must care for; therefore, we must have tooled that ensures a strong protection, detection and response play exists. Tooling must exist to protect those assets for things that are known, stopping them in their tracks, and to detect problems that may exist (anomalies, odd behaviors, malicious objects, configuration problems, etc.) and then respond with automated (or orchestrated) methods to quickly remedied.
  • Cyber Incident Response Plan and Tooling – Security practitioners need a solid incident response plan, and incident response tooling that can be leveraged to quickly identify, remediate and eradicate problems before they become a news article that we all reference later.
new_releases

What Is Sircam Virus And How Its Legacy Began?

Managed Service Providers (MSPs) And Managed Security Service Providers (MSSPs) Can Thrive In These Interesting Times

Security service providers can thrive in these times of vast change by delivering security value, plain and simple. Security is complex, and it’s difficult to understand. The Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) that will come out on top, are the ones who understand – and truly care about – their customers’ security problems and fears, and who focus on building a solid solution to quell their customers’ risks.

This advice might sound simple, but so many security providers get this wrong and too many times the customer is left waiting to see what security value their money produced for them.

, , , , , , , , , , , , , ,
Previous Post
Zero Trust: Five Misconception Debunked About Zero Trust’s Dependability
Next Post
Vulnerability Disclosure: Navigating The Responsible Disclosure Landscape

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Menu

Pin It on Pinterest