Introducing “Swipe Left” Security
You may have heard about the idea of shifting left in security: as developers move more to the cloud, security professionals are looking more upstream – or left – toward where the development processes are initiated. As you progress from Development to Q/A and then Production (moving right), there is more underlying thinking about end-to-end security.
I want to take this idea one step further and talk about something new – “swipe left” security.
At the highest level, the security industry is struggling to solve two key problems in parallel: collecting the right data -- and-- evaluating it quickly.
The first problem is related to the growing theme around “security analytics” – the breadcrumbs that help us understand if there are actual security incidents that need our time and attention. The attack surface of any enterprise today is bigger than ever. You have to look at network traffic at the packet level; you have to look at server, application and user logs; and you have to look at commands and processes that have been initiated. You also must cover all the environments: bare metal on premises, virtualized, containers and public cloud.
The second problem is that even if you see the right data or security analytics, how do you quickly assess the value of the alert? Most security teams today will tell you that they are overwhelmed with data, have too many false positives, and are chasing too many low-level alerts. With a traditional SIEM, you might have 3,000 alerts a day, and responding to that many becomes a human scaling problem.
I like to think of security analytics as sifting through a haystack full of needles, and ideally, you want to get better and better at sifting through that haystack. Any product that allows you to tighten your security posture every day is something you want. This capability doesn’t come from just machine learning or the hyped impact of “AI,” it comes by looking across all the alerts and asking, “are any of these related?”
Let’s take a simple example, say Steve logs into a server at 4am (and I have never logged in at that time before), and my IP address is from Thailand, but I am based in San Francisco, and the app I launched is not an app I have launched before. These individual alerts might be perceived as noise, but when looked at together, you see a pattern that builds a strong case that there is a breach underway!
So how do you collect more and more data without increasing the already too-high volume of security alerts? To gain insights into every environment I noted above, you would need to combine the industry’s broadest security data collection engine with automated techniques for enriching data collection and correlating seemingly noisy, low-level alerts and showing that they are in fact related.
How do you help security analysts scale through automation, so they are presented with a simple “red” or “green” highlight, and they simply swipe left to reject an alert, or swipe right to accept it and look deeper into the issue? Ideally, a security analyst would not have to examine 3,000 alerts a day, but three, so that investigating and triggering automated responses can be programmed as policies.
Well, here’s the good news. This idea is not fiction, or on a road map somewhere, it is why I joined Stellar Cyber. Our software, Starlight, connects the dots from your growing attack surface today while reducing the number of alerts to a manageable size!
Stellar Cyber is the only company combining packet, file, and log data into one data set – with one unifying product that intelligently curates your data, reduces false positives and negatives, and triggers automated responses. To learn more, check out www.stellarcyber.ai.
Steve, thanks for sharing! I am hosting a live monthly roundtable every first Wednesday at 11am EST to trade tips and tricks on how to build effective revenue strategies. I would love to have you be one of my special guests! We will review topics such as: -LinkedIn Automation: Using Groups and Events as anchors -Email Automation: How to safely send thousands of emails and what the new Google and Yahoo mail limitations mean -How to use thought leadership and MasterMind events to drive top-of-funnel -Content Creation: What drives meetings to be booked, how to use ChatGPT and Gemini effectively Please join us by using this link to register: https://www.eventbrite.com/e/monthly-roundtablemastermind-revenue-generation-tips-and-tactics-tickets-1236618492199
Looks like you are already having fun here. I trust you have seen Feldman's new toy. Would love to see how you cool 15kw of power consumption in a single chip.