{"id":21067,"date":"2024-06-24T14:37:57","date_gmt":"2024-06-24T14:37:57","guid":{"rendered":"https:\/\/interface.media\/?p=21067"},"modified":"2024-06-24T14:38:05","modified_gmt":"2024-06-24T14:38:05","slug":"building-defences-for-a-cyber-tsunami","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/","title":{"rendered":"Building defences for a cyber tsunami"},"content":{"rendered":"\n<p>Over just six months the number of reported cyber-dependent crime incidents in the UK <a href=\"https:\/\/www.statista.com\/statistics\/1425971\/uk-cybercrime-and-fraud-cases\/\">rose by over 20%<\/a>. As AI continues to lower the barrier to entry for criminals, that number will likely <a href=\"https:\/\/www.ncsc.gov.uk\/report\/impact-of-ai-on-cyber-threat\">grow<\/a> even faster <a href=\"https:\/\/interface.media\/blog\/2024\/06\/06\/election-insecurity-why-our-government-cant-protect-us-from-cyberwarfare\/\">over the next two years<\/a>.<\/p>\n\n\n\n<p>We\u2019re no longer facing a flood of cyber attacks. We\u2019re facing a tsunami. And as we prepare our defences for the colossal wave of threats heading our way, we can take inspiration from the early-warning detection systems used to protect against tsunamis.<\/p>\n\n\n\n<p>Backed by a robust communications infrastructure, these systems harness a network of sensors to detect and verify the threat before issuing timely alarms. Local authorities can notify those at risk in advance and preparations can be made to prevent loss of life and damage to property.<\/p>\n\n\n\n<p>Similarly, in cyber security, Threat Detection and Response (TDR) systems can help identify threats early and mitigate any potential damage. They too utilise effective communications and a network of \u2018sensors\u2019 to alert security professionals of any irregularities requiring their attention.<\/p>\n\n\n\n<p>However, for TDR systems to be effective against the current surge of threats, security teams much introduce them as part of an integrated mesh architecture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-modern-security-for-modern-infrastructure\"><strong><em>Modern security for modern infrastructure<\/em><\/strong><\/h3>\n\n\n\n<p>For many years, organisations protected themselves against cyber attacks by establishing <a href=\"https:\/\/interface.media\/blog\/2024\/05\/06\/zero-trust-is-becoming-more-commonplace-but-industry-still-has-a-ways-to-go\/\">defensive measures<\/a> around a defined perimeter, such as their company intranets. Defences typically comprised of firewalls, antivirus software, and intrusion detection systems. While these are still important tools for defending private networks against outside threats, in today\u2019s digital world they are no longer enough.<\/p>\n\n\n\n<p>Businesses have been rapidly transferring processes and storage to cloud networks. This, combined with the rise in remote working and Software as a Service (SaaS) offerings, has all but dissolved the perimeter that traditional security measures were designed to shield. As companies move assets off-premises, security teams must extend controls into all systems where data is stored.<\/p>\n\n\n\n<p>This once again draws parallels with the tsunami early-warning systems. A sensor on the coastline (the defined perimeter) will still provide a tsunami warning, but it is unlikely that you will be able to do anything about it when it\u2019s already at your door. However, placing a sensor further out at sea provides more advanced notice. The sensor can prompt people to take action before the wave reaches the shore.<\/p>\n\n\n\n<p>Likewise, when properly integrated, TDR can extend security monitoring across your entire IT infrastructure, including third-party applications. This helps security teams detect and respond to threats earlier and greatly reduces the amount of damage they can cause.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-extended-visibility-with-tdr\"><strong><em>Extended visibility with TDR<\/em><\/strong><\/h3>\n\n\n\n<p>An effectively integrated TDR collects, aggregates, and analyses security data from various tools to provide comprehensive, accurate threat detection in real-time. It simplifies the approach, while providing greater visibility across on-premises and cloud environments. Achieving this requires focusing on three cyber security solutions at once.<\/p>\n\n\n\n<p>First is Endpoint Detection and Response (EDR), a security solution used to monitor endpoints \u2013 i.e., computers, tablets, phones etc \u2013 and detect and investigate any potential threats. It uses data analytics to identify suspicious network activity. When it detects suspicious activity, it blocks any malicious actions and alerts security teams.<\/p>\n\n\n\n<p>The second solution is Network Detection and Response (NDR) which, as the name suggests, executes a similar task but at the network level. It uses AI, machine learning and behavioural analytics to monitor traffic. This then allows it to establish a baseline of activity. The NDR solution can then measure activity agains the benchmar to track malicious or anomalous activity.<\/p>\n\n\n\n<p>Finally, at the heart of this approach is Security Incident and Event Management (SIEM). It collects and analyses the data from your EDR and NDR solutions, along with additional security logs, and provides a central view of all potential threats.<\/p>\n\n\n\n<p>Combining these three solutions results in an extended detection and response (XDR) system that reduces false positive alerts, provides better threat identification, and offers greater visibility over network assets. It also presents security teams with contextually rich, triangulated cases assembled from a unique set of high-fidelity detections across multiple layers \u2013 giving them the detailed information required to prepare a more effective and timely response.<\/p>\n\n\n\n<p>The implementation and management of XDR systems can be a time consuming and resource intensive process, but it has become an increasingly important part of modern cyber security. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-early-warning-for-a-better-response\"><strong><em>Early warning for a better response<\/em><\/strong><\/h3>\n\n\n\n<p>In the face of an escalating cyber tsunami, spurred on by the advanced capabilities of AI, the need for security measures that transcend traditional defences has never been more critical. To quickly identify threats outside the traditional security perimeter, businesses need access to detailed information showing which actions to take.<\/p>\n\n\n\n<p>Much like how tsunami early-warning systems pull together various signals to identify and verify a potential threat, a well-integrated XDR can achieve this by collating data from numerous touchpoints. This further enhances visibility across the entire IT infrastructure, allowing security teams to respond swiftly and effectively to any potential attack.<\/p>\n\n\n\n<p>Ultimately, the evolution of the threat landscape demands an equally dynamic and proactive approach to security. Businesses will be better prepared and more resilient to the ever-growing wave of threats by embracing the principles of early detection, comprehensive monitoring and integrated response mechanisms. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rob Pocock, Technology Director at Red Helix, explores how cyber security teams can guard against the rising tide of cyber threats. <\/p>\n","protected":false},"author":480,"featured_media":21068,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-06-24T14:38:02Z","apple_news_api_id":"63008544-4099-49c4-8293-cfc611857448","apple_news_api_modified_at":"2024-06-24T14:38:02Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AYwCFRECZScSCk8_GEYV0SA","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3],"tags":[],"topic":[613],"class_list":["post-21067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","topic-cybersecurity"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Building defences for a cyber tsunami - Interface<\/title>\n<meta name=\"description\" content=\"Rob Pocock, Technology Director at Red Helix, explores how cyber security teams can guard against the rising tide of cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Building defences for a cyber tsunami\" \/>\n<meta property=\"og:description\" content=\"Rob Pocock, Technology Director at Red Helix, explores how cyber security teams can guard against the rising tide of cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-24T14:37:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T14:38:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1224\" \/>\n\t<meta property=\"og:image:height\" content=\"857\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/\",\"name\":\"Building defences for a cyber tsunami - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg\",\"datePublished\":\"2024-06-24T14:37:57+00:00\",\"dateModified\":\"2024-06-24T14:38:05+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"Rob Pocock, Technology Director at Red Helix, explores how cyber security teams can guard against the rising tide of cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg\",\"width\":1224,\"height\":857,\"caption\":\"Blue wave Japanese style\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Building defences for a cyber tsunami\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Building defences for a cyber tsunami - Interface","description":"Rob Pocock, Technology Director at Red Helix, explores how cyber security teams can guard against the rising tide of cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Building defences for a cyber tsunami","og_description":"Rob Pocock, Technology Director at Red Helix, explores how cyber security teams can guard against the rising tide of cyber threats.","og_url":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/","og_site_name":"Interface","article_published_time":"2024-06-24T14:37:57+00:00","article_modified_time":"2024-06-24T14:38:05+00:00","og_image":[{"width":1224,"height":857,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/","url":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/","name":"Building defences for a cyber tsunami - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg","datePublished":"2024-06-24T14:37:57+00:00","dateModified":"2024-06-24T14:38:05+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"Rob Pocock, Technology Director at Red Helix, explores how cyber security teams can guard against the rising tide of cyber threats.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/06\/iStock-502764522.jpg","width":1224,"height":857,"caption":"Blue wave Japanese style"},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/06\/24\/building-defences-for-a-cyber-tsunami\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"Building defences for a cyber tsunami"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=21067"}],"version-history":[{"count":1,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21067\/revisions"}],"predecessor-version":[{"id":21069,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/21067\/revisions\/21069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/21068"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=21067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=21067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=21067"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=21067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}