{"id":1116600,"date":"2023-07-27T20:32:47","date_gmt":"2023-07-28T00:32:47","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/security-hygiene-and-posture-management-a-work-in-progress-techtarget\/"},"modified":"2023-07-27T20:32:47","modified_gmt":"2023-07-28T00:32:47","slug":"security-hygiene-and-posture-management-a-work-in-progress-techtarget","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/progress\/security-hygiene-and-posture-management-a-work-in-progress-techtarget\/","title":{"rendered":"Security hygiene and posture management: A work in progress &#8211; TechTarget"},"content":{"rendered":"<p><p>    It may be high priority, but organizations still approach    security hygiene and posture management haphazardly in silos,    which opens doors for cyber adversaries.  <\/p>\n<p>        Security hygiene and posture management is the bedrock of    cybersecurity. But before thinking about acceptable use    policies,     security awareness training or an assortment of security    technologies, organizations must have a full understanding of    the assets they possess, who owns them, what those assets are    used for and whether they are configured securely.  <\/p>\n<p>        Each standards body and security best practice, such as    NIST-800 series, CIS Critical Security Controls and ISO 27001,    and every security regulation -- including HIPAA, PCI DSS and    FISMA -- start with a mandate for strong and continuous    security hygiene and posture management.  <\/p>\n<p>    To put the topic in context, think of security hygiene and    posture management as the practice of locking and maintaining    the integrity of all your doors and windows to protect your    house and family from intruders. But what if you live in a    European castle with dozens of family members and hundreds or    thousands of doors and windows? Different staff members    throughout the castle are responsible for maintaining and    locking a designated subset of the total, and your safety    depends on all these people getting it right, which is    extremely difficult to monitor or verify.  <\/p>\n<p>      The example above summarizes the state of security hygiene      and posture management today -- distributed, siloed and      difficult to keep up with. Recent       research from TechTarget's Enterprise Strategy Group      illustrated the following issues:    <\/p>\n<p>      CISOs see these problems and realize that things are getting      out of hand. The research also pointed to the following steps      organizations are taking to address security hygiene and      posture management at scale:    <\/p>\n<p>      Regardless of the category, these tools are designed to      provide visibility into blind spots, aggregate and analyze      siloed data, and deliver some type of risk-based guidance on      which issues to prioritize. Historically, security hygiene      and posture management technologies received little venture      capital funding, but given the growing attack surface and      sophisticated threats the Silicon Valley Sand Hill Road crowd      is jumping onboard.    <\/p>\n<p>      Soon after I joined Enterprise Strategy Group in 2003, I gave      a presentation on vulnerability management at a security      conference. I talked about best practices, division of labor      and tools. When it was time for the Q&A, a few audience      members posed the following questions: \"How do we know we've      discovered all the assets?\" and \"How do we prioritize which      vulnerabilities to patch?\"    <\/p>\n<p>      Twenty years later, our research indicates we haven't      adequately answered those questions, while the scale of the      problems has increased exponentially. Our windows and doors      are fragile and often open when we think they're strong and      locked. Without a security hygiene and posture management      baseline, cybersecurity protection becomes little more than a      roll of the dice.    <\/p>\n<p>      Enterprise Strategy Group is a division of TechTarget.      Its analysts have business relationships with technology      vendors.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/opinion\/Security-hygiene-and-posture-management-A-work-in-progress\" title=\"Security hygiene and posture management: A work in progress - TechTarget\">Security hygiene and posture management: A work in progress - TechTarget<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> It may be high priority, but organizations still approach security hygiene and posture management haphazardly in silos, which opens doors for cyber adversaries. Security hygiene and posture management is the bedrock of cybersecurity. But before thinking about acceptable use policies, security awareness training or an assortment of security technologies, organizations must have a full understanding of the assets they possess, who owns them, what those assets are used for and whether they are configured securely.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/progress\/security-hygiene-and-posture-management-a-work-in-progress-techtarget\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187725],"tags":[],"class_list":["post-1116600","post","type-post","status-publish","format-standard","hentry","category-progress"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1116600"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1116600"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1116600\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1116600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1116600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1116600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}