True Awareness for National Cybersecurity Awareness Month

True Awareness for National Cybersecurity Awareness Month

True Awareness for National Cybersecurity Awareness Month


Welcome to the Allari blog! As owners of Allari, Ravi & I look forward to using this medium to share current information about IT Operations, Cybersecurity, software products & IT Management with our readers. We’ll report, analyze, and provide perspective & recommendations from some of the industry’s leading minds as well as from our direct experiences. We will strive to provide blogs that impart important information. These are the types of blogs that our team members prefer to read, and that’s exactly what we plan to provide.

​John Mathieu, Founder
* Allari provides IT Operations & Cybersecurity services to organizations using IBM, Microsoft, Oracle & SAP Products. We provide a True IT as a Service delivery model with Offices in US, Ecuador, Brazil & India. Customers located in 56 countries.

#goallari #allari #ITaaS #ITService #ITasaService #ITSM #ITOperations #ITMaintenance #CyberSecurity

October is National Cybersecurity Awareness Month (NCSAM) and an opportune time to remind every organization of the importance of “awareness” to their cybersecurity programs.

I fully realize you’re already well-aware of the relentless stream of global cyberattacks against organizations and individuals every day.

And we all know that security teams are drowning in a sea of alerts in large part driven by a defense-in-depth strategy with layers of protection that aren’t integrated and create a massive amount of logs and events.

Not to mention the numerous threat feeds most organizations subscribe to – from commercial sources, open source, government, industry and existing security vendors. What more do we need to be aware of? 

What I’m talking about is contextual awareness so that you don’t spend a good portion of your day responding to calls from management about the latest threat in the headlines, or ignore half of those threat feeds because the volume of data is simply too overwhelming to consume.

Contextual awareness drives value for security teams of all sizes and capabilities so that we can do more with the resources we have to take the right actions faster to better protect and mitigate risk to our organizations.  

Context comes from aggregating internal threat and event data along with external threat feeds in a platform that serves as a central repository and normalizes that data so that it is in a usable format.

By enriching events and associated indicators from inside your environment (for example from sources including your security information and event management (SIEM) system, log management repository and case management systems) with external data on indicators, adversaries and their methods, you gain context to understand the who, what, where, when, why and how of an attack.

Now you can prioritize based on relevance to your environment, but what is relevant to one company may not be for another.

Many intelligence feed vendors provide “global” risk scores but, in fact, these can contribute to the noise since the score is not within the context of your company’s specific environment.

It is important to be able to assess and change risk scores based on parameters you set. Filtering out what’s noise for you allows you to understand what to work on first.

You can focus on what really matters to your organization rather than wasting time and resources chasing ghosts.

This is the kind of awareness companies need to accelerate security tasks that bog down Tier 1 analysts.

For example, by finding the signal through the noise you can simplify and accelerate alert triage. And vulnerability management resources can focus on where the risk is greatest by prioritizing vulnerabilities with knowledge about how vulnerabilities are being exploited.

Contextual awareness also benefits Tier2/Tier 3 investigationresponse and threat hunting activities. Whether digging deeper into an escalated trouble ticket or investigating suspicious behavior observed in the environment, analysts can pivot to adversary and external sources to learn more about associated indicators.

They can then search for and compare indicators across the infrastructure and find matches between high-risk indicators and internal threat and event data that suggest possible connections. When proactively hunting for threats, analysts can use data, such as from the MITRE ATT&CK framework – a knowledge base for intelligence on techniques, tactics and adversaries.

For example, if they are interested in malware currently being used to target their industry, they can leverage MITRE ATT&CK data to hunt for potential indicators of compromise or possible related system events within their environment.

Finally, as threat hunting is a continuous process, when new data and learnings are added to the platform, intelligence is automatically reevaluated and reprioritized to remain relevant. 

Even companies that don’t have their own security operations centers can benefit from contextual awareness through managed security services providers (MSSPs) or managed detection and response (MDR) services.

Providers of these services can use the platform to deliver threat intelligence and security monitoring that’s relevant to your organization.

They can also offer additional, high value and customized services such as risk assessments, threat hunting and incident response that focus on the threats that matter most to you and improve your overall security operations. 

Now in its 16th year, NCSAM is a great vehicle to raise awareness for cybersecurity and to remind every organization that the ability to improve security operations begins with contextual awareness. How aware are you?

Source: Marc Solomon

Related Articles:

JDE Installations Held Ransom by RYUK & Sodinokibi

Is a CMDB Required for Effective IT?

Data/BI/Analytics 101 [Knowledge Series]

Get Weekly Updates on Key Issues Facing IT Directors

Subscribe to our Weekly E-zine

Cost Calculator Book a Call
jde installations attacked by cyber criminals

JDE Installations Attacked by Cyber Criminals

JDE Installations Attacked by Cyber Criminals The threat is real. In the

​Read More
JDE vulnerability for your business

60% of Security Breaches are from Known Unpatched Vulnerabilities

60% of Security Breaches are from Known Unpatched Vulnerabilities  Vulnerabilities are flaws

​Read More
Founded in 1999, Trailblazer Allari is making a bold move towards providing IT Operations and Maintenance, as well as Cost and Efficiency conscious IT Leaders via an Innovative On-demand Consumption-based Service Value Model. IT Leaders gain access to processes and expertise for Scheduled Maintenance, On-Demand IT Tasks and Advanced IT Projects.
All delivered as IT-As-A-Service (ITaaS) via the Go.Allari Platform for daily support and projects related to ERP, Database, Helpdesk, Security, and Vulnerability Management. Its breadth of Platform Coverage is extensive, covering all Major Platforms including JD Edwards EnterpriseOne, Oracle Database, MS SQL, Microsoft BI, Qualys IT Security and many more.
Allari supports its customers from locations around the Globe 24/7. To learn more visit: