9 months, 5 days ago

Solorigate: A case study for why supply chain security is critical for governments and businesses

By Jim Hietala (VP, BD and Security), Andras Szakal (VP and CTO), John Linford Security and OTTF Forum Director) – The Open Group

In potentially the most damaging cyber-supply chain attack ever, a leading IT systems management vendor became the latest hi-tech company to suffer a major cybersecurity breach with wide-reaching consequences. The malware that caused the attack has been dubbed SUNBURST by Microsoft and code-named Solorigate by FireEye, the security consulting firm that uncovered the breach after falling victim to it late last year.

After successfully infiltrating the development environment, attackers were able to observe and learn how to subvert the vendor’s development and operations pipeline. Hackers were then able to maliciously taint the vendor’s product by planting a sophisticated trojan. Once the software, which required broad systems access, was installed in customers’ environments, the attackers were able to leverage the tainted software to exfiltrate sensitive information from within an organization’s network.

10 months, 16 days ago

Updates to the Open FAIR™ Body of Knowledge, Part 3

The Open Group Security Forum is thrilled to announce the publication of an update to the Open FAIR™ Body of Knowledge (BoK). The Open FAIR BoK is comprised of The Open Group Risk Taxonomy (O-RT) Standard and The Open Group Risk Analysis (O-RA) Standard. The Open Group initiated a standards effort regarding FAIR ~10 years ago, and these standards define the official, open, vendor-neutral and consensus-developed definition of FAIR.

This blog post is the third of three in a series to describe updates to the Open FAIR™ Body of Knowledge. It will describe specific updates to O-RT to bring it to Version 3.0. The first post described revisions made to both O-RA and O-RT for consistency between the documents; the second post described specific updates to O-RA to bring it to Version 2.0.

3 years, 22 days ago

The Badge of Honor: Future-Proof Your Career with The Open Group Certifications

Continuous learning and development – it’s a phrase that can either fill you with joy or fear. Why?  Because we all know that the evolving technology landscape, driven by the advancement of AI, IoT, social media, mobile, andcloud technologies mean that our skills always need to be up to date. This is increasingly important as CIOs look to their internal teams to become experts on architecting for cloud environments and cutting through the market hyperbole. We are constantly asked to provide the frameworks, models, and maps that will work as part of a future forward EA strategy.

3 years, 6 months ago

Introducing The Open Group Open FAIR™ Risk Analysis Tool

Since late in 2016, The Open Group Security Forum have been collaborating with San Jose State University and Probability Management to develop a Risk Analysis tool that adheres to The Open Group Open FAIR™ Standard.

With a view to creating a tool that helps accelerate the adoption of the Open FAIR standard, the tool provides both experienced and novice risk practitioners with a practical and pragmatic tool to help analyse perceived risk in a consistent and simple to use way, whatever industry they work in. It is now ready and we are pleased to make it available to use and evaluate for free.

3 years, 8 months ago

Zero Trust on a Beer Budget

I have a good friend that has a small business (roughly 100 employees and 2 office locations, everything lives in the cloud, no real “network” to speak of) that is doing well.  A few weeks ago, over barbeque and range time (some folks play golf, we sho…

3 years, 10 months ago

New Security Architecture Practitioner’s Initiative

Organization leaders know they need cybersecurity, but 2017 has driven that point home with special force. Intelligence Agencies have shown that even the most secure targets are vulnerable, and the rapid proliferation of ransomware has demonstrated that damage can be crippling and come without warning.

The Security Architecture Practitioner’s Initiative is a joint effort of The Open Group Security Forum (a global thought leader in Enterprise Architecture) and The SABSA Institute (a global thought leader in Security Architecture) to articulate in a clear, approachable way the characteristics of a highly-qualified Security Architect.

3 years, 11 months ago

TIP of the Iceberg: Research Announcement on Threat Intel Platforms

A common feature in the threat intelligence platform (TIP) space is aggregation of data and providing an interface for managing threat intelligence — this seems to be where the product visions diverge. While many of these platforms have been arou…

4 years, 20 days ago

CSI: Your Network – Reconstructing the Breach

September 2017 was a busy month. Three major breach notifications in Deloitte, the SEC, and Equifax… and my first Wave dropped, coincidentally on Digital Forensics & Incident Response Service Providers. Following all this commotion, I had a client reach out and ask me how… How are investigators able to reconstruct digital crime scenes to identify […]

4 years, 1 month ago

Forrester Gathers Experts Across Disciplines To Tackle Europe’s Most Pressing Privacy, Security, and Trust Challenges

Fresh off a successful event in Washington, DC last week, we’re gearing up for Forrester’s Privacy & Security Forum Europe in London on 5-6 October. Forrester is gathering experts in cybersecurity, privacy, customer experience, regulatory compliance, identity management, personalization, blockchain, and a range of related topics.  Together, Forrester analysts and leaders from firms like ABN […]

4 years, 1 month ago

Equifax Does More Than Credit Scores

Our reaction to the Equifax breach was similar to what we imagine many people went through. First, we wanted to know if we were affected? Second, What about our spouse and other immediate family members? Third, Better keep an eye on the old credit report or initiate a credit freeze. Since Forrester offers credit monitoring […]

4 years, 2 months ago

Customer Trust And Loyalty Determine Success On The Dark Web, Too

  This is a guest post by Salvatore Schiano a researcher serving Security & Risk Management professionals The dark web is an underground marketplace for drugs, stolen credentials, stolen financial and medical records, and other illicit products and services.  Cybercriminals use it to monetize breached data but they also use it to buy and sell exploits […]