Connect with us

Cyber Security

Show Me the APIs!

Avatar

Published

on

I was talking to a customer the other day – a global organization with dozens of geographic operational centers and a sophisticated, mature security operations discipline – and he said something that captured what I’ve been wanting to express for a while.

“I must see five to six security technology vendors a week,” he said. “I tell them all the same thing: It’s not about your technology – it’s about how your technology integrates with what I already have.”

But Can My Customer Use It?

This is something that’s bothered me for years and I’m happy to start hearing it from buyers. Trade shows are full of interesting new security startups with attractive new tools. But can my customers actually use them?

When I go to security industry tradeshows, I make a point of seeking out the newest stuff. But what happens when I walk up to a new product vendor? Invariably, the first thing I’m shown is the user interface. The UI is clean-looking with colorful pie charts and curvy trend lines, each of which, it’s claimed, allows security operators to immediately pinpoint exactly what’s going on and what to do about it in a way that’s never been done before and that no competitor could ever hope to equal.

And maybe the product is as awesome as the vendor says — it probably does some really cool and useful stuff. I also get that your new hotness is difficult to show in any way other than via the UI, especially on a trade show floor.

And I get that UI candy pulls people into the booth.

I just don’t want you to stop there. I want to see how an existing security team that has a dozen or more solutions is already going to operationalize this new tool. As a global provider of security solutions, Secureworks® encounters dozens of security tools across thousands of clients. There are millions of ways that these solutions combine to form a coherent security program and it’s different at every single customer.

Four Asks for New Security Technologies

So I have a question for tech vendors: You’re making some really cool stuff – how can my customers integrate your technologies to their infrastructure without changing how they operate?

  1. Show me how your core functionality has been surrounded by APIs. What percentage of core functionality is accessible via API? If it’s less than 100%, why is that?
  2. Show me how you used APIs to allow your UI to access your core engine. This gives me confidence that everything I see on the screen can be done programmatically.
  3. Show me the third-party integrations you’ve already built yourself and tell me where to get them. Maybe my customers already use some of these solutions. In fact, it would be great if you could show me how your solution operates within the operational context of a tool I already use.
  4. Talk to me about your support program for API integration, just in case I want to integrate it myself.

A caveat here: A lot of security technology providers DO have robust programming interfaces today, so this is not meant to suggest that every new security technology has this challenge. I just don’t see enough emphasis on APIs and integration when I look around. Maybe it’s the venue, as trade shows tend not to bring out the best in any of us.

Still, the issue remains. Given the huge number of security solutions on the market and the endless revolving door of security startups and exits, the need to integrate isn’t going away any time soon. And, today, another attractive UI may be a nice-to-have but it isn’t what’s going to make the world a safer place.

Republished from https://www.secureworks.com/blog/show-me-the-apis

Cyber Security

Cyber Hygiene, Cyber Humans & Cyber Automation

Avatar

Published

on

Add bookmark




The Cyber Security Hub ran the Global Summit where lessons learned from the past 12-14 months were shared by every single presenter over the course of three days. There were three prevalent themes- hygiene, humans and automation. On hygiene- time and time again, presenters suggested that it doesn’t matter what you do, it doesn’t matter what you implement and it doesn’t matter how much you know if your hygiene isn’t up to snuff. The other two points dovetail- you can better take care of your humans and avoid burnout if you automate the simple stuff.

Episode Overview:

Cyber Security Consultant for F-Secure, Jason Johnson joins TF7 Radio Host George Rettas to break down the use of Artificial Intelligence in the Cyber Security Industry. Johnson unpacks the practical real world applications of AI being used in the security tools right now, and explains what the risks are in using AI in your security stack. Johnson talks about how organizations can manage and mitigate AI risks, what separates valuable AI products through all the buzz words being tossed around, and even how threat actors are using AI to automate their attacks. All this and much more on Episode #181 of Task Force 7 Radio. Does AI pose a threat to job security, in cybersecurity or in other sectors? How can people get started learning about AI?

Listen Now:

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://www.cshub.com/executive-decisions/articles/hygiene-humans-automation

Continue Reading

Cyber Security

Qualcomm Chip Bug Opens Android Fans to Eavesdropping

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/

Continue Reading

Cyber Security

Critical Cisco SD-WAN, HyperFlex Bugs Threaten Corporate Networks

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://threatpost.com/critical-cisco-sd-wan-hyperflex-bugs/165923/

Continue Reading

Cyber Security

Ryuk Ransomware Attack Sprung by Frugal Student

Avatar

Published

on

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

Coinsmart. Beste Bitcoin-Börse in Europa
Source: https://threatpost.com/ryuk-ransomware-attack-student/165918/

Continue Reading
AR/VR2 mins ago

Demeo Will Have Oculus Store Cross-Buy Between Rift And Quest

Cyber Security7 mins ago

Cyber Hygiene, Cyber Humans & Cyber Automation

PR Newswire14 mins ago

Algonquin Power & Utilities Corp. Announces 10% Common Share Dividend Increase, Declares Second Quarter 2021 Common Share Dividend of U.S.$0.1706 (C$0.2094), and Declares Second Quarter 2021 Preferred Share Dividends

PR Newswire14 mins ago

Minister of State-Owned Enterprises, Erick Thohir Announces PT Pertamina International Shipping as the Company’s First Subholding Shipping Company

PR Newswire17 mins ago

Excavator Market in Japan to grow by USD 696.82 million through 2025|17000+ Technavio Research Reports

AI18 mins ago

Falsified Satellite Images in Deepfake Geography Seen as Security Threat

PR Newswire20 mins ago

Customertimes erhält drei „Best in Class”-Auszeichnungen im POI’s 2021 Retail Sales Execution Vendor Panorama Report

PR Newswire22 mins ago

Gene Silvers Guest Stars In Apple TV Plus Drama ‘The Mosquito Coast’

PR Newswire24 mins ago

Arte Becomes Miami’s First New Development To Accept Cryptocurrency

PR Newswire25 mins ago

Caterpillar and the Caterpillar Foundation Donate Additional $3.4 Million in COVID-19 Relief

PR Newswire25 mins ago

Healthcare Trust Prices Public Offering of 7.375% Series A Cumulative Redeemable Perpetual Preferred Stock

Medical Devices27 mins ago

Becton Dickinson prepares to say goodbye to its $1B diabetes care business

Bioengineer29 mins ago

PCB contamination in Icelandic orcas: a matter of diet

PR Newswire31 mins ago

Spin Master Corp. Announces Election of Directors

PR Newswire32 mins ago

Worldwide Laboratory Automation Industry to 2026 – Featuring Danaher, PerkinElmer and Thermo Fisher Among Others

PR Newswire37 mins ago

Global Explosive Detection Equipment Market to grow by USD 2.73 billion through 2025|17000+ Technavio Research Reports

AR/VR41 mins ago

Demeo Is A VR Tabletop Dungeon Crawler And It’s AWESOME

Esports41 mins ago

Fortnite Console Champions Cup to Start May 14

PR Newswire41 mins ago

MolecuLight annonce l’intégration de son dispositif d’imagerie par fluorescence i:X® au programme API d’analyse des tissus de Net Health

PR Newswire43 mins ago

The Enduring Legacy of Wine Visionary Tony Terlato Raises $40,000 for Illinois Restaurant Workers

Esports45 mins ago

Nintendo spent $880 million on research and development last year, mentions next platform after Switch

Blockchain46 mins ago

Ethereum Classic Price Analysis: 6 May

Energy47 mins ago

Battle North Gold Reports First Quarter 2021 Financial Results and Reminds Shareholders of Annual and Special Meeting of Shareholder Proxy Voting Deadline

Energy47 mins ago

ISS and Glass Lewis Support the Plan of Arrangement Between Battle North Gold Corporation and Evolution Mining Limited

Esports48 mins ago

MTG tabletop sanctioned play returns to US at end of May

Esports48 mins ago

MTG Arena heats up with Historic Anthology V, Mirror, Mirror, and Jumpstart events

Esports48 mins ago

Counterspell, Sanctum Prelate will be reprinted in Modern Horizons 2

Esports48 mins ago

Modern Horizons 2 brings new cards directly to MTG Modern on June 18

Cleantech52 mins ago

Brown Advisory’s Karina Funk on water risk implications for businesses

Cleantech52 mins ago

Brown Advisory’s Karina Funk on water risk implications for businesses

Trending