Skip to content
Weblog | Sijmen Ruwhof
Cyber security, hacking & privacy
Weblog | Sijmen Ruwhof
  • Home
  • Research
  • About me
  • In the media
  • Links
  • Contact
← Podbast: Wat moet je doen als je per ongeluk kinderporno tegenkomt?
NOS: WiFi-hackapparatuur die Russische spionnen waarschijnlijk gebruikten →

Automation tools needs to be tuned to risk scenarios

Posted on 12-09-2018 by Sijmen Ruwhof

Juniper Networks released an e-book about security automation and analytics, in which I also participated:

From Sijmen Ruwhof’s perspective, the complexity of today’s IT environments has made an ethical hacker’s job easier than ever. “I break into systems for my customers, with permission of course,” he says. “I report on all the security vulnerabilities I find and advise customers in how they can protect themselves against hackers.” In his view, there are two essential parts of a cybersecurity strategy. One is monitoring, detection, and remediation. The other is vulnerability testing. This is true whether you are trying to repair a breach that has already occurred or prevent one from occurring in the future. “You need to see what’s going on, analyze traffic, and look for discrepancies with normal traffic,” Ruwhof explains. “You also need to search for vulnerabilities. Vulnerability testing finds and closes holes. Monitoring detects exploits of holes that have not been found.” He emphasizes that these two go hand in hand. Some tools even allow you to feed security testing results directly into your security-monitoring solution so that you can correlate vulnerabilities to actual monitored traffic and network activity. For instance, if a security alert indicates a file server may be under attack, and this correlates with a vulnerability identified by the testing tool, chaining these two together enables much faster insight and response, and fewer false alarms. Automation plays an essential role when processing data from multiple tools and sources. It enables systems to identify important data while eliminating redundant information much more quickly than humans. Using a security information and event management (SIEM) product to consolidate and correlate data from various testing and monitoring tools requires analytics, machine learning, and automation, but it takes a lot of effort to properly configure security automation tools properly. Make a road map of what you want to automate. Then see what security products… reduce time to process these.

About Sijmen Ruwhof

Independent IT Security Researcher / Ethical Hacker
View all posts by Sijmen Ruwhof →
This entry was posted in analysis, anti-malware, automation, cyber security, interview, security monitoring. Bookmark the permalink.
← Podbast: Wat moet je doen als je per ongeluk kinderporno tegenkomt?
NOS: WiFi-hackapparatuur die Russische spionnen waarschijnlijk gebruikten →
  • My social media profiles:

    • YouTube
    • Soundcloud
    • LinkedIn
    • Twitter
    • WhatsApp
    • Link
  • Latest posts:

    • Privacy Policy
    • Editie NL: Russische hackersgroep ‘Laundry Bear’ achter cyberaanvallen op Nederlandse politie
    • NOS Stories: #TikTokRefugees massaal naar andere Chinese app
    • Radio 1 Pointer: Een foto omtoveren tot naaktfoto of voorzien van borstvergroting? ‘Het is kinderspel’
    • BNR: Operation Endgame – Grootste actie ooit tegen ransomware, 5 botnets uit de lucht gehaald
    • Radio 1: Banken adviseren om cash geld in huis te hebben: logisch of bangmakerij?
  • Categories:

    • 3FM
    • advertising
    • analysis
    • anti-malware
    • article
    • automation
    • backup
    • banking
    • biometrics
    • bluetooth
    • bnr nieuwsradio
    • browser security
    • bug
    • camera
    • chat-app
    • child porn
    • computer worm
    • copyright
    • critical infrastructure
    • cross-site scripting
    • cryptography
    • cyber crime
    • cyber security
    • cyber terrorisme
    • cyber warfare
    • data leakage
    • ddos
    • deanonymization
    • demonstration
    • discussion
    • drive-by
    • e-voting
    • election hacking
    • espionage
    • fake profiles
    • FunX
    • Google
    • hacking
    • hart van nederland
    • identity theft
    • internet of things
    • interview
    • javascript
    • kassa
    • law enforcement
    • magazine
    • massasurveillance
    • media
    • menu
    • mobile phone
    • multi-factor authentication
    • nos
    • online banking
    • online dating
    • osint
    • password
    • pentesting
    • phishing
    • php
    • php security
    • physical security
    • podcast
    • politics
    • presentation
    • privacy
    • privacy awareness
    • radio
    • radio 1
    • ransomware
    • responsible disclosure
    • russia
    • sap
    • scam
    • scoping
    • search engine optimization
    • security
    • security advice
    • security assessment
    • security audit
    • security awareness
    • security management
    • security monitoring
    • security vulnerability
    • seo
    • smart devices
    • social media
    • software development
    • telecom
    • tv
    • uncategorized
    • vulnerability management
    • website
    • website security
    • wi-fi
    • wiretapping
    • witwassen
    • zero day
  • Main menu:

    • Home
    • Research
    • About me
    • In the media
    • Links
    • Contact
    • Privacy Policy
Weblog | Sijmen Ruwhof Privacy Policy
Proudly powered by WordPress.