Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Back to Basics to Address Evolving Cyber Threats

By Matt Brown
October 30, 2014

The final entry in this four-part series really maps closely to the objectives set forth by National Cyber Security Awareness Month, focusing on what is really required to effectively protect systems against cyberattacks.  Concerns about evolving cyber threats –a major theme of this article series – have the industry increasingly talking about this topic.  Although the threat landscape has dramatically changed, in many instances system vulnerabilities have remained the same over the past 15 years.  That’s not to say that the volume of attackers or sensitive information stored in these systems hasn’t significantly increased.  The problems that organizations are facing are not necessarily new vulnerabilities, but more so the heightened attention paid to address those issues.

A prime example is the recent JPMorgan Chase data breach, which impacted 76 million households and seven million small businesses.  Although it is widely reported that this successful attack came from an organized cyber crime ring out of Russia – a threat scenario that was probably unthinkable 15 years ago – the attack is a case study that has been plaguing the industry for years: how to detect and block a persistent attack.  This situation has been witnessed over and over again, from Target and Home Depot to Albertsons and Dairy Queen, leading many to ask how organizations can address these cyber threats.

Going Back to the Basics

The previous article in this series spoke to the advancement of cyber tools and technologies, all the shiny new objects that organizations have at their disposal.  Yes, cyber technology is progressing for the better, and the market is in much better shape.  That said, organizations are often more concerned about buying and integrating the latest and greatest into their security posture.  In actuality however, the ability to take a step back to address the basics might serve them more effectively.

Chairman and CEO Robert Carr of Heartland Payment Systems has been outspoken about this fact given the recent retail and financial institution breaches.  In 2008, his organization suffered what was, at the time, the largest breach in history, with 130 million debit and credit card accounts accessed.  Carr went back to the basics after the breach, implementing end-to-end encryption and tokenization into the Heartland security infrastructure.  These technologies are not new, and they certainly are not considered “sexy,” but they are strong, stable solutions that are often overlooked for the “next big thing.” 

Organizations need to take a step back and look at their infrastructure and assets, while prioritizing vulnerabilities by potential impact in order to fix the worst problems first.  Instead of turning to the latest emerging technology, they should ensure that they have the foundational tools in place to understand 100 percent of their systems inventory, manage configurations, scan for vulnerabilities regularly and identify the most significant weaknesses for immediate remediation.

Consider Continuous Monitoring

Although going back to the basics is a priority, organizations should also consider integrating a continuous monitoring approach.  Continuous monitoring – which was made mainstream by the Department of Homeland Security (DHS) with its Continuous Diagnostics and Mitigation (CDM) program – is a process of conducting ongoing, real-time checks for compliance and risk, providing an accurate, near real-time state of network security.  The key to continuous monitoring is implementing the tools and processes to understand and manage the hardware and software inventory of the enterprise while scanning routinely to identify and remediate vulnerabilities.

The government is really leading the way with the CDM initiative.  CDM, and its $6 billion contract vehicle, set the stage to help fortify federal “.gov” networks – and the often classified, sensitive and personal data that resides on those networks.  The commercial market is also looking to adopt a similar concept, but is challenged by the dynamic and consistently changing network environment they face due to acquisitions, mergers, expansions, retractions and the like.  It is important to transition from focusing purely on compliance reporting towards combating threats consistently and proactively by enumerating the worst problems and prioritizing their remediation based on impact. 

No matter how comprehensive an organization believes its cyber systems are designed to protect against new and emerging threats, continuous monitoring enables them to remain a step ahead to close the most problematic attack vectors.

A lot has transpired in terms of cybersecurity technology advancement, mostly for the better.  These advancements, however, have sometimes led organizations astray in securing their infrastructure and operations.  It is still important to pursue new approaches, such as continuous monitoring, and emerging technologies, but it is just as critical to take that step back to conduct the due diligence to validate foundational capabilities are in place.

 

Previous articles in this series:

The Changing Cybersecurity Landscape

How Has Cybersecurity Changed Operations?

How Y2K Changed the Field of Cybersecurity Technology

KEYWORDS: continuous improvement cyber risk mitigation cyber security cyber security awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matt Brown is the Vice President of Homeland Security and Cyber Solutions for the Knowledge Consulting Group (KCG).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber security

    Going back to the basics this Cybersecurity Awareness Month

    See More
  • budget

    Security Leaders Must Adjust Cybersecurity Budgets to Effectively Address 2018 Cyber Threats

    See More
  • Laptop with crumbled papers

    Automation and a “back to basics” approach will shape cybersecurity

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products

Events

View AllSubmit An Event
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    ON DEMAND: Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing