Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >COUNT TO FIVE AND KEEP ADVANCED THREATS AT BAY
    Business

    Count to Five and Keep Advanced Threats at Bay

    Published by Gbaf News

    Posted on June 6, 2014

    5 min read

    Last updated: January 22, 2026

    Add as preferred source on Google
    Image of Sean Newman, Security Evangelist at Cisco, highlighting strategies to counter advanced threats in business environments. This visual supports the article on adapting security infrastructure for modern cyber challenges.
    Security expert discussing advanced threat protection strategies - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    By Sean Newman, Security Evangelist For Sourcefire, Now Part Of Cisco

    As business environments change, security infrastructure must change to enable business success. Whether you’re operating under increased risk from advanced targeted attacks, or transitioning to the cloud or mobile devices for the productivity, agility and efficiency these technologies provide, the end result is the same: You need to adapt your security infrastructure in lock-step. You can’t afford to leave gaps in protection for today’s sophisticated attackers exploit.

    However, finding the resources to address the evolving cyber security landscape effectively can be challenging. Today’s attacks are stealthier than ever. To understand and protect against them, organisations need to mobilise all aspects of their defenses to focus on the threat, including services. It’s about gaining visibility and control across the extended network and the full attack continuum – before an attack happens, during the time it is in progress, and even after an attack may have been successful, with information stolen or systems damaged. This new threat-centric model is driving changes in cyber security technologies, products and services alike.

    Count To Five And Keep Advanced Threats At Bay By Sean Newman, Security Evangelist For Sourcefire, Now Part Of CISCO

    Count To Five And Keep Advanced Threats At Bay By Sean Newman, Security Evangelist For Sourcefire, Now Part Of CISCO

    The first wave of managed security service providers (MSSPs) focused on getting products and tools up and running, maintenance, upgrades, and training. But today, effective cyber security services need to be based on an in-depth and continuously evolving knowledge of the threats themselves, not just the operations of the technology. Reflective of a new era in how we must address cyber security, some industry analysts are starting to call this next wave of security services MSSP 2.0.

    Based on in-house security skills, budget, and competing business priorities you may choose to outsource more or less of your cyber security needs. Wherever you fall on the outsourcing spectrum, when evaluating managed security services, the following five questions can help ensure you get the support you need to stay focused on the threat:

    1. What types of telemetry form the basis for your visibility and detection capabilities?
    If the answer is simply flow or log data, that isn’t enough. Other data, such as protocol metadata (i.e., data extracted directly from packets traversing the network) is a rich source of insights into today’s more popular attack methods like ‘watering hole’ attacks and phishing campaigns that contain links to malicious sites. In these cases, the ability to incorporate HTTP metadata in a telemetry model provides the depth of information needed to help detect web-based threats. With more data, the more effective the MSSP will be in zeroing-in on anomalies and that’s a key capability to finding the needle in the haystack.

    2. How are you performing analytics on that data?
    With the inspection of more data, simple analytics models such as correlating logs against common rule-sets fall short, particularly if they do not function in real-time. Advanced, real-time, big data analytics techniques are essential to scrutinise the large amounts of data gathered, not just locally across the enterprise, but globally through community-based threat intelligence. This level of analysis isn’t based on rules that attackers can understand and hence evade, but is predictive and uses dynamic statistical modelling to identify anomalous behaviours from granular, customer network baselines and other indications of compromise (IoCs) to pinpoint likely malicious activities. Regardless of the number of telemetry sources used, applying robust analytics to data, rather than simple correlation, will result in high-fidelity detections.

    3. Where do you keep that data and how do you protect it?
    You’ll need to understand if the data is held onsite, at the MSSP’s data centre, or in the cloud. Depending on the type of data your organisation has, the compliance requirements you face, and the guarantees the MSSP provides, you’ll need to decide if the answer is adequate and, if not, can they offer an alternative approach. This is an individual choice, for each organisation, and must be based on the comfort level of all parties affected from the technical, legal, and business sides of the organisation.

    4. What do you report on?
    Data is great, but you must be able to understand and act on it. You need a level of assurance that the data is correlated to provide context, so that the information you’re getting is relevant to your environment and has been prioritised. In this way you can focus on the threats that matter most. Time is of the essence when dealing with advanced targeted attacks that have a specific mission. Understand if the MSSP is able to present you with only vetted, high-fidelity, information, versus an endless list of events that require further analysis and investigation to determine whether they are true or false alerts.

    5. How can you help protect my organisation against unknown, zero-day attacks?
    To detect and protect against zero-day threats you need to be able to go beyond traditional point-in-time approaches with capabilities that let you monitor and analyse on an ongoing basis, across your extended network. That’s where the value of diverse telemetry, coupled with predictive analytics and statistical modelling, really becomes apparent. This moves beyond mere event correlation, that the MSSPs have offered for years.  In combination, these capabilities can pinpoint nearly imperceptible IoCs and anomalies to help identify these particularly stealthy and damaging attacks.

    Given today’s business, regulatory, and cyber security challenges more and more organisations are looking for outside expert help, to protect their environments from cyber attacks. By asking these key questions, you can help ensure you’re MSSP is staying focused on the threats themselves in order to deliver the protection you need.

    More from Business

    Explore more articles in the Business category

    Image for Submit Your Entry for Years of Excellence Awards 2026
    Submit Your Entry for Years of Excellence Awards 2026
    Image for Nominations Open for Travel & Hospitality Awards 2026
    Nominations Open for Travel & Hospitality Awards 2026
    Image for Submit Your Entry Today for Telecom Awards 2026
    Submit Your Entry Today for Telecom Awards 2026
    Image for Submit Your Entries for The Next 100 Global Awards 2026
    Submit Your Entries for the Next 100 Global Awards 2026
    Image for Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Image for Nominations Invited for Real Estate Development Awards 2026
    Nominations Invited for Real Estate Development Awards 2026
    Image for Submit Your Entry: Process & Product Awards 2026
    Submit Your Entry: Process & Product Awards 2026
    Image for Call for Entries: HR & Recruitment Awards 2026
    Call for Entries: HR & Recruitment Awards 2026
    Image for Submit Your Nominations Today for Education & Training Awards 2026
    Submit Your Nominations Today for Education & Training Awards 2026
    Image for Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Image for Submit Your Entry Today for Business Awards 2026
    Submit Your Entry Today for Business Awards 2026
    Image for Decentralized Masters’ ‘family culture’ building trust instead of hierarchy
    Decentralized Masters’ ‘family Culture’ Building Trust Instead of Hierarchy
    View All Business Posts
    Previous Business PostWhy the Device in Your Pocket Is Taxing the CIO
    Next Business PostContractorfinancials – Specialist Adviser to the Uks Contractor and Freelancer Community