• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

December 22, 2016 by

19 Dec 16. USAF, industry go on “offense” with cybersecurity.
The Air Force and private industry are refining new cyber techniques designed to anticipate and thwart enemy attacks before they happen. IT management firm Robbins Gioia, a cyber security partner with the Air Force and other government entities, told Defense Systems about some cutting-edge methods currently used to examine code behind firewalls.
“We create an intelligence radar for upcoming threats” to allow them to detect and respond proactively, Andrew Robinson, CEO of Robbins Gioia, said in an interview.
These tactics are aimed at filtering through current systems to establish areas where cyber-attackers might seek to penetrate networks.
“Look behind the firewall and start to filter through current systems and determine where weaknesses in their code and structure exist,” Robinson explained.
Another element of this approach involves a thorough assessment of prior cyber-attacks on other government systems as a method of setting up a defense against them.
Robinson explained that, in some cases, porting data to different architecture, new blade servers or modernized firewalls can be part of the calculus for a so-called “active defense” posture.
The strategy is intended to leverage security data form multiple sources, including operating system logs, application logs, firewall log data, proxy logs, intrusion detection systems, host-based intrusion detection systems, identity management systems and dynamic malware execution environments, RG officials explained.
Robbins Gioia’s collaboration with the Air Force incorporates an approach called “cyber radar.” This is, as it sounds, a cyber-threat detection technique using a dashboard to assess risk and real-time vulnerability. RG’s efforts also include implementing Risk Management Framework guidance from the National Institute of Standards and Technology.
This is an important move, said Robinson, because as security controls are no longer a one-size-fits-all compliance drill. Instead, the agencies can focus on identifying and prioritizing actual risk, based on mission impact, and tailor controls for each system.
Although Robbins Gioia did not cite specifics regarding various cyber techniques, their effort to identify and thwart would-be attackers is consistent with a common cyber-security tactic known as a “honey pot.”
“Honey Pot” cyber techniques generally involve luring potential malicious actors to a particular system where their actions can be more easily observed, RG officials said.
“The technique also helps protect key data stores since their activities are diverted and defenders can assess the best methods to intercept or block new attacks,” a company official told Defense Systems. (Source: Defense Systems)

19 Dec 16. Cyberbit, whose cybersecurity solutions protect the world’s most sensitive systems, today announced a new version of its SOC 3D automation and orchestration platform that increases productivity and effectiveness of the SOC and substantially reduces incident response times. The new SOC 3D platform integrates with all major SIEM and security solutions, automates SOC runbooks and workflows, and prioritizes incidents according to their business impact. SOC 3D increases a SOC team’s ability to manage and respond to the most critical threats facing the business and eliminate fatigue from the storm of excessive alerts.
According to the Ponemon Institute’s 2016 Cost of Data Breach Study, organizations recognize that the longer it takes to detect and contain a data breach, the more costly it becomes to resolve. SOC 3D reduces the time to identify and respond to these advanced threats saving companies time and money. SOC 3D boosts the effectiveness of the enterprise SOC by maximizing existing investments and staff. The platform simplifies, automates and continuously optimizes response workflows, accelerates decision making, and prioritizes critical incidents via a single management console.

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT