cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope debuta como Líder en el Cuadrante Mágico™ de Gartner® para Single-Vendor SASE
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Libro SD-WAN moderno para principiantes de SASE
                  Modern SD-WAN for SASE Dummies
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Let's Do Great Things Together
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                Soluciones Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      Security Community, Let’s Also Do Some Self-Reflection

                                      Mar 29 2022

                                      Co-authored by Jason Barnes and John Khotsyphom

                                      Some of us in the security community took a step backward last week in our ability to deal with the crisis involving Okta. Instead of exercising well-thought-out and practiced contingency plans to objectively assess risk, many individuals took a trolling posture on social media. The reaction was neither professional nor conducive to our mission as defenders against threat actors seeking to do us harm. We should take a collective look in the mirror and reconsider our attitudes and reactions when one of our partners endures a crisis even when communications are questionable.

                                      Understandably, leaders and practitioners are under intense pressure any time an Okta, SolarWinds, or Target hits the news. We scramble for answers. As humans, that is our nature. But fixing the blame on Okta via social media based on some screenshots proves some in the community have far more improvements to make than we imagined. Some of us seem to have reverted back to the hope that technology will save us all, ignoring the imperative of critical thought required to effectively defend an enterprise.

                                      Key things to remember about crisis response

                                      In a crisis—whether it pertains to a cyber attack, physical disaster, or supply chain logistics—business leaders must focus on people, organizational reputation, and finances. It is a balancing act between the head and the heart. The Board and C-Suite know their values. They prepare and practice for contingencies. As security practitioners, this understanding is table-stakes. The organization hired us with the assumption that we share these interests.

                                      Top mistakes companies make in a crisis

                                      To illustrate how poorly others in the community might have responded to this situation, let’s recall some fundamental mistakes in crisis communication. When a company in crisis rushes to judgment, its ability to respond accurately is crippled. Over-reaction can raise irrelevant questions. Failing to act and communicate induces uncertainty. Bending facts destroys faith—especially in cybersecurity where evidence will eventually bear out the truth. A lack of concern and empathy—or failure to demonstrate them—erodes trust, cohesion, and morale. A lack of teamwork or information transparency dooms your response to failure from the outset. Fixing blame is an empty cop-out that destroys integrity.

                                      Enough of the negative tone. Let’s think critically about how to deal with these situations using a proactive threat-driven approach.

                                      Self-reflection and hunting the unknown

                                      Cybersecurity as a community must constantly review our own shortfalls during times of crisis. Recent months have highlighted areas many struggle with, such as supply-chain management, geopolitical risks, and vulnerability management. Every event presents an opportunity for us to self-reflect and improve our own preparedness. 

                                      As news of the Okta breach developed many took to their SIEMs and reviewed Okta logs hunting for suspicious activities. How does one hunt a ghost based on screenshots and speculation? First, cybersecurity teams must have an understanding of their environment. Having a good understanding of the architecture around an Okta deployment can help teams determine their attack model and also identify gaps, such as logging, privilege access, documentation, and/or asset management. The gaps identified can be used to help demystify the ghost. As more information is released your teams will be better prepared to react if needed.

                                      Define normal for your environment and determine how outliers manifest in the logs. A common threat hunting technique, stack counting, can be applied to help teams track down those leads and validate them. If there is new knowledge to inform the overall hunt, leverage that to further refine your insights. Repeat the effort to continually create order and derive understanding from chaos with the help of automation.

                                      Time for an attitude check

                                      If there is a fundamental flaw in an organization’s posture or execution in developing solutions, then that can, and should, be researched and debated. Since security practitioners and leaders have a vested interest in the success of our partners, we should contribute ideas toward those improvements. Before we even get to that, however, we must ensure that our own houses are in order before we cast stones.

                                      author image
                                      Jason Barnes
                                      Jason Barnes is Senior Manager of Security Operations and manages the global Netskope Security Operations Center.
                                      Jason Barnes is Senior Manager of Security Operations and manages the global Netskope Security Operations Center.

                                      ¡Mantente informado!

                                      Suscríbase para recibir lo último del blog de Netskope