Subscribe free to our newsletters via your




CYBER WARS
Companies are making cybersecurity a greater priority
by Staff Writers
Washington DC (SPX) Jun 17, 2015


File image.

Companies are spending increasing amounts on cybersecurity tools, but aren't convinced their data is truly secure and many chief information security officers believe that attackers are gaining on their defenses, according to a new RAND Corporation study.

Charting the future of cybersecurity is difficult because so much is shrouded in secrecy, no one is entirely certain of all the methods malicious hackers use to infiltrate systems and businesses do not want to disclose their safety measures, according to the report.

While worldwide spending on cybersecurity is close to $70 billion a year and growing at 10 percent to 15 percent annually, many chief information security officers believe that hackers may gain the upper hand two to five years from now, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

"Despite the pessimism in the field, we found that companies are paying a lot more attention to cybersecurity than they were even five years ago," said Martin Libicki, co-lead author of the study and senior management scientist at RAND, a nonprofit research organization.

"Companies that didn't even have a chief information security officer five years ago have one now, and CEOs are more likely to listen to them. Core software is improving and new cybersecurity products continue to appear, which is likely to make a hacker's job more difficult and more expensive."

The RAND study draws on interviews with 18 chief information security officers and details the burgeoning world of cybersecurity products. It also reviews the relationship between software quality and the processes used to discover software vulnerabilities. Insights from these elements were used to develop a model that can shed light on the relationship between organizational choices and the cost of confronting cyberattacks.

"Companies know what they spend on cybersecurity, but quantifying what they save by preventing malicious attacks is much harder to tally," said Lillian Ablon, co-lead author of the report and a researcher at RAND. "In addition, malicious hackers can be extremely sophisticated, so costly measures to improve security beget countermeasures from hackers.

"Cybersecurity is a continual cycle of trying to eliminate weaknesses and out-think an attacker. Currently, the best that defenders can do is to make it expensive for the attackers in terms of money, time, resources and research."

Libicki and Ablon say several of the study's findings surprised them. They found that it was the effect of a cyberattack on reputation - rather than direct costs - that worried most chief information security officers. It matters less what actual data is affected than the fact that any data is put at risk.

However, the process of estimating those losses is not particularly comprehensive, and the ability to understand and articulate an organization's risk from network penetrations in a standard and consistent manner does not exist - and may not exist for the foreseeable future.

RAND created a framework that portrays the struggle of organizations to minimize the cost arising from insecurity in cyberspace over a 10-year period. Those costs include the losses from cyberattack, the direct costs of training users, and the direct cost of buying and using cyber safety tools.

Additional costs also must be factored in, including the indirect costs associated with restrictions on employees using their personal devices on company networks and the indirect costs of air-gapping - ensuring a computer network is physically isolated from unsecure networks. This is particularly true for sensitive sub-networks.

The RAND study includes recommendations for both organizations and policymakers. Organizations need to determine what needs to be protected and how badly, including what machines are on a company's network, what applications are running and what privileges have been established. Employees' desire to bring their own devices and connect them to the company network also can increase vulnerabilities.

Libicki said most of the chief information security officers who were interviewed were not interested in government efforts to improve cybersecurity. However, the RAND researchers believe government could play a useful role. For example, a government guide outlining how systems fail - similar to guides for aviation and medical fields - could help build a body of knowledge to help educate companies with the goal of developing higher levels of cybersecurity.

The study, "The Defender's Dilemma: Charting a Course Toward Cybersecurity," can be found here


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
RAND Corporation
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Journalist denies claim that Snowden files breached
Washington (AFP) June 15, 2015
A journalist who published the first reports from Edward Snowden's leaked documents offered a detailed rebuttal Monday to allegations that Russian and Chinese spies accessed the former intelligence contractor's files. Glenn Greenwald, writing on online news website The Intercept, said the reports by the Sunday Times and BBC were based on the false premise that Snowden kept possession of the ... read more


CYBER WARS
Long, hard road for Nepal's disabled quake survivors

Escaped tiger kills man in Georgia

Google launches company to tackle city life woes

Asian cities half of top 10 costliest expat destinations: survey

CYBER WARS
Russia Begins Mass Production of Glonass-K1 Navigation Satellites

Russia, China Plan to Equip Commercial Trucks With Glonass, BeiDou

GLONASS to Go on Stream in 2015

Satellites make a load of difference to bridge safety

CYBER WARS
Stone tools from Jordan point to dawn of division of labor

Cell density remains constant as brain shrinks with age

Manuela's Madrid: a pretty, gritty city

Technology offers bird's-eye view of foreclosure affects on landscape

CYBER WARS
We are entering a 'golden age' of animal tracking

Method reveals what bacteria sense in their surroundings

Increased carbon dioxide levels in air restrict plants' ability to absorb nutrients

Night vision in tune with nature in hovering hawkmoths

CYBER WARS
Activists struggle to replace state in fight with Russian AIDS epidemic

US anthrax samples shipped to Japan in 2005: Pentagon

Virus evolution and human behavior shape global patterns of flu movement

Woman isolated in Hong Kong hospital over MERS

CYBER WARS
China anti-discrimination group protests 'arrest' of staff

China 'Hogwarts' students embrace ancient tradition at graduation

China's Panchen Lama meets Xi, calls for 'national unity'

How the mighty are fallen: selfies and smiles in Zhou village

CYBER WARS
Polish bootcamp trains security contractors for mission impossible

A blast and gunfire: Mexico's chopper battle

CYBER WARS
Researchers trawl public data for signs of corruption

HSBC unveils radical overhaul to axe up to 50,000 jobs

China economy shows more weakness as imports, exports fall

China manufacturing index at six-month high but strains remain




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.