The Red, Blue and Purple Team and What’s Between Them

CybeRiskBlog, Cybersecurity

Purple Team

With a tradition stemming from military training exercises, the idea of pitting a “Red Team” of trained attackers against a “Blue Team” defending the organization has been taken up over the years by a diverse set of institutions. These include government bodies like the U.S. National Security Agency and the Government Accountability Office and corporate enterprises in which war-gaming exercises are used to test the security infrastructure of active businesses. The concept has also been used to test the physical security measures deployed at places like nuclear facilities, or the Department of Energy’s National Laboratories and Technology Centers. It’s an adversarial technique that can too often lead to the same outcome as many a sporting event: Two opposing sides give … Read More

Evolving Enterprise Cyber Security Challenge: The Lack of Professional Resources and the Impact on the Organization

CybeRiskBlog, Cybersecurity

Enterprise Cyber Security

In what’s been described as an “existential threat” to enterprise, national, and even global security, the past few years have seen a continuous drain on the pool of enterprise cyber security talent. Figures from 2016 confirmed that 86% of companies reported a shortage of professionals available to fill the growing need for skilled information security personnel. And a study conducted by the Enterprise Strategy Group (ESG) in 2017 cited 70% of cyber security professionals as saying that the skills shortage has had an impact on their organization. More worrying than this was the claim by 45% of organizations that there was “a problematic shortage of cyber security skills.” This dearth of talent is occurring at a time when cybercriminal networks … Read More

Pros and Cons of “SOC” (SOC as a Service) or “MSS” (Managed Security Services)

CybeRiskBlog, Cybersecurity

SOC as a Service

For some years now, enterprises looking to reduce the strain on their financial, human, and other resources have been looking to external suppliers to flesh out their organizational portfolios – in the form of cloud-based infrastructure, applications, and services, or the outsourcing of essential functions to qualified third parties. Enterprise security has not been exempt from this trend, and with the evolution of the outsourcing market has come the packaging of almost every aspect of IT as a subscription-based or on-demand commodity. Service offerings from third parties give enterprises the opportunity to gain from state-of-the-art technologies and the expertise of seasoned security professionals, while avoiding the significant capital outlays, recurring and maintenance costs, and management complexity of having to do … Read More