Q1. David, you are an expert on threat forecasting. Describe for us some of the biggest challenges that enterprises face in forecasting current and upcoming threats, focusing on the ones that matter the most to them.
As everyone in security knows, it is impossible to prepare for every potential risk, as the threat landscape is constantly evolving. To compound the issue, most enterprises still find themselves being reactionary and not allocating enough time to proactive security measures. One of the biggest challenges in deploying a proactive monitoring strategy is emulating realistic traffic, including legitimate and threat traffic, while not disrupting the customer and employee user experience. While there are a multitude of network devices that assist in defence, more often than not, organizations deploy devices with recommended policies. This often leads to unexpected behaviors and hidden gaps in security defences that can be compromised, resulting in inappropriate access and, at the extreme, breaches and data loss.
To address these challenges, enterprises that take a proactive monitoring strategy can move beyond basic compliance requirements and are able to focus their energy on fortifying their defences based on the current threat landscape and on reducing their cybersecurity risk. This allows enterprises to truly understand their unique environments, focus on the attacks that are relevant to their situations, and not be distracted by the volume of threat data, much of which is not relevant to them.
Spirent assists enterprises that are monitoring proactively with our data breach assessment solution. CyberFlood Data Breach Assessment enables customers to understand their environment better as well as to continually and safely assess their security posture, utilising fully emulated attacks, malware, and data loss prevention scenarios. Customers receive individualized intelligence that allows them to prioritize the specific areas of their environment that need to be addressed for maximum security efficacy. For customers looking for manual penetration testing in addition to automated data breach assessment, Spirent SecurityLabs offers a full suite of penetration services for devices, applications, and networks.
Q2. Eric, how has the growing adoption of DevOps, CI/CD, containers, and microservices impacted security-testing requirements? What new challenges have these models raised for app security testers?
DevOps and CI/CD have impacted security testing requirements by bringing security testing into the development cycle earlier. Anytime a unit test is run in a CI/CD model, a security assessment can be run at the same time. This benefits organizations by not only developing more security solutions but also identifying flaws earlier, which reduces remediation time and expense.
The same holds true for containers and microservices, as these are fundamentally miniaturized applications that are vulnerable to threats and exploits. These services require the same level of continuous testing, as they traditionally include APIs, web services, and other potentially vulnerable and often overlooked access points. Containers and microservices are often provided by third parties, which makes remediation dependent on actions taken outside the organization.
The increased adoption of these models requires adding security testing in planning and earlier stages of the application lifecycle. Development teams not accustomed to developing applications with security in mind may also need education in secure development best practices and the ultimate benefits to developers of adopting such practices. SecDevOps needs to consider that this strategy adds time to cycles for security testing but ultimately can reduce the full time-to-market of solutions that meet both business and security requirements. As a CEO, I am personally passionate about every employee considering the security implications of their actions and believe that as leaders, we must include security in our strategic business initiatives.
Q3. Eric, what's your advice for organizations looking to integrate security practices into their DevOps and CI/CD workflows? What's a good place to begin?
As organizations look to deploy SecDevOps as a strategy, they must first ensure that they have educated their development teams on secure development best practices and adopting a "security first" mentality. This may include a third-party security audit of current coding practices, including libraries used and data storage policies. Next, organizations need to consider the time added to cycles for security testing and the tools that result in a stronger security posture.
Choosing tools with a strong automation framework, well-defined APIs, and diverse coverage streamlines the adoption process and are a critical first step to successfully shift to this paradigm. As an example, many of largest global service providers leverage the Spirent CyberFlood Fuzzing solution during their CI/CD workflows to validate and certify CPE firmware releases for security. This radically reduces the risk of unknowingly deploying hundreds of thousands of residential gateways with security flaws. Static code analysis and penetration testing provide additional critical layers of testing to ensure improved visibility and the intelligence required for proactive remediation.
We are seeing increasing numbers of enterprises incorporating security practices earlier in the development lifecycle as they recognize the financial benefits of doing so and because the role of security in business decisions is evolving.
Q4. David, what do you want attendees at Black Hat Europe to know about Spirent's security services? What are you hoping they will take away from your organization's presence at the event?
Our rich history of supporting communication and network device manufacturers, service providers, and enterprise and government customers over the last eight decades provides us with the unique perspective and expertise to partner with our customers on their quest to reduce cybersecurity risk. With the newest addition to our security portfolio, CyberFlood Data Breach Assessment, customers are able to validate their defences and proactively identify areas for concern to allow for remediation prior to compromise. This solution was a child of our performance and security testing solutions in the labs of the largest network equipment manufacturers, service providers, and global 250 enterprises and the real-world expertise of our Threat Research group and SecurityLabs team's research on emerging threats and techniques.
We hope that attendees who visit our booth will come away seeing that we are their strategic partner, enabling our customers to capitalise on the latest technology trends, including IoT, mobility, and blockchain, while addressing the formidable cybersecurity demands of our connected world.