{"id":176715,"date":"2017-02-11T08:20:58","date_gmt":"2017-02-11T13:20:58","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/why-dont-we-see-more-automation-in-federal-networks-nextgov\/"},"modified":"2017-02-11T08:20:58","modified_gmt":"2017-02-11T13:20:58","slug":"why-dont-we-see-more-automation-in-federal-networks-nextgov","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/why-dont-we-see-more-automation-in-federal-networks-nextgov\/","title":{"rendered":"Why Don&#8217;t We See More Automation in Federal Networks? &#8211; Nextgov"},"content":{"rendered":"<p><p>    John Breeden II is an award-winning journalist and reviewer    with over 20 years of experience covering technology and    government. He is currently the CEO of    theTech    Writers Bureau,a group that creates technological    thought leadership content for organizations of all sizes.    Twitter: @LabGuys  <\/p>\n<p>    Over the past few months, I was fortunate enough to be asked to    evaluate several cutting-edge technologies designed to make    government networks more secure. Some of these were more    advanced than others, and a few were hindered by newer    technologies like cloud computing. But they all showed a great    deal of promise for the federal government if deployed    correctly.  <\/p>\n<p>    One of the most interesting possibilities is creating an    event-driven architecture to add automation to the federal    defensive arsenal. Given a single router can generate over    100,000 data points every few seconds, any network of any size    quickly grows beyond the ability for even teams of humans to    protect 100 percent effectively. There is just too much    dataand not enough analysts.  <\/p>\n<p>     Get the best federal technology news and ideas    delivered right to your inbox.     Sign up here.  <\/p>\n<p>    Attackers know this, and use all that data as cover to remain    undetected once they breach a network. That is why the latest        Mandiant M-Trends 2016 Report found most organizations were    breached for 146 days before the successful attack was    discovered. The government is no exception to this rule.  <\/p>\n<p>    Automation could be the answer, reducing the time from    detection to remediation from months to seconds. The basic    concept is simple enough. It uses the power of the network    itself to counter threats, making it a machine versus machine    affair. Thats not unlike the classic \"WarGames\" movie,    where a young Matthew Broderick gets the WOPR computer to play    itself in a game to teach it futility.  <\/p>\n<p>    The concept of automation in cybersecurity can be broken down    into three basic levels. At the first and most-basic level is    human-driven automation. A human operator needs to do    something, like check a series of network devices for    compliance issues, so they activate a script to do the heavy    lifting. This can cut down on operator workload and help with    odorous chores like patch management, but doesnt improve    breach response times.  <\/p>\n<p>    At the second level, which makes the most sense for federal    agencies, there is event-driven automation. At level two,    humans teach computers their various processes. If a computer    goes down, they open a trouble ticket, or if a virus is    detected, they wipe the system and restore the core operating    system.  <\/p>\n<p>    Humans set those event triggers and program what responses to    automatically take. Then, they can remove themselves from the    loop, though they can also keep a hand in things, such as    having a computer notify a supervisor about a particularly    dangerous trigger.  <\/p>\n<p>    Computers are never actually doing anything beyond what they    are taught, but can respond to security events at machine    speed, automating the remediation of many threats, especially    low-level ones, and freeing up analysts to work on larger    projects or trickier situations.  <\/p>\n<p>    The final level is almost science fiction at this point, though    there have been glimpses of what could one day be possible in    things like IBMs    Watson and     Googles AlphaGo software. At that level, computers still    respond to events, but also program their own triggers and    responses, possibility making processes even more efficient    than the original human-driven plan.  <\/p>\n<p>    So why dont we see more automation in federal networks, even    at level two?  <\/p>\n<p>    The answer is to get there requires both hardware and software.    The software is available, but you also really need to have    event-driven hardware in your network to take advantage of all    of automations benefits. That is ready too, but installing it    piece by piece could be a slow process. In an event-driven    network, devices should be built so they can interface with one    another to open the doorway to true automation. Specifically,    they should all have:  <\/p>\n<p>    Once the hardware is in place, and several companies do offer    automation-ready gear, the triggers and responses can be    programmed to help fight cybersecurity threats at machine    speed. The computers can do everything an analyst does without    getting tired,hungry or bored.  <\/p>\n<p>    Beyond just cybersecurity, having an event-driven architecture    in place also opens new efficiencies. Automation can, for    example, be used in data centers for the automatic provisioning    of software-defined networks based on customer needs,    establishing micro-segments or automating the application of    services by applying service-chaining.  <\/p>\n<p>    There are some impressive capabilities in this field, but the    first benefits of automation for most agencies will most    certainly be in cybersecurity. Especially now with a critical    shortage of analysts and the government not hiring anyone new,    technologies like automation need to be quickly deployed before    agencies start to get steamrolled under the next wave of    advanced attacks.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.nextgov.com\/technology-news\/tech-insider\/2017\/02\/why-dont-we-see-more-automation-federal-networks\/135202\/\" title=\"Why Don't We See More Automation in Federal Networks? - Nextgov\">Why Don't We See More Automation in Federal Networks? - Nextgov<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology and government.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/why-dont-we-see-more-automation-in-federal-networks-nextgov\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-176715","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176715"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=176715"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176715\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=176715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=176715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=176715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}