Monday, August 15, 2022
  • Comparing Twilio and Slack breach responses
  • The Importance of Faraday Technology with Aaron Zar from SLNT
  • 5 tips for spotting and avoiding Pig butchering scams
  • Aspen Security Forum 2022 – Moderator: Dafna Linzer – The 21st Century Nuclear Arms Race
  • XKCD ‘Coffee Cup Holes’

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Like Football, Your Cybersecurity Defense Needs a Strong Offense

SBN

Like Football, Your Cybersecurity Defense Needs a Strong Offense

by Tripwire Guest Authors on March 18, 2019

“The best defense is a good offense.”

History credits Revolutionary War hero George Washington with being among the first to vocalize this concept, later famously echoed by heavyweight boxing champ Jack Dempsey and football god Vince Lombardi.

And it’s easy to see what they mean. The idea is that being proactive — going on the offense instead of focusing solely on defense — will frustrate the opposition’s ability to attack and yield insights that provide a strategic advantage.

So it’s not surprising to learn that this time-honored principle common to armed conflict, hand-to-hand combat and professional sports is also essential to the high-stakes world of cybersecurity. And when I say “high stakes,” I am referring to predictions that the global cost of cybercrime could reach as high as $6 trillion by 2021.

So Which Is More Important: Offensive or Defensive Cybersecurity?

Ha, it’s a trick question! If you answered “both,” congratulations — you are correct. Though the cybersecurity landscape is populated by black-hat hackers (the bad guys) and white-hat hackers (the good guys), the issue itself is by no means black and white.

In fact, any analysis of the “offensive cybersecurity vs. defensive cybersecurity” question reveals that both approaches are necessary in the trillion-dollar war on cybercrime and ongoing military efforts to keep citizens and governments safe from high-tech cyber warfare.

Today, it’s essential to not only build the strongest possible defenses but also to deploy creative strategies to gain information on your attackers and how they are trying to breach your networks and penetrate your systems.

This idea that “the best defense is a good offense” is not just a slogan representing the conventional wisdom of the cybersecurity intelligentsia. It’s also the title of a report on the future of cybersecurity by the global defense, management and (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Tripwire Guest Authors. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/cybersecurity-defense-needs-strong-offense/

March 18, 2019March 18, 2019 Tripwire Guest Authors Cyber Security, Cybersecurity, Defense, Featured Articles, Offense
  • ← Conferences
  • Secure Coding — Top 15 Code Analysis Tools →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Black Hat 2022 Trip Report
Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face
Weekly Ransomware Attacks Taking a Toll on Security Pros
Where to Start Your Zero-Trust Journey
Is Your AppSec Program Developer-Centric?
Ransomware attack blamed for closure of all 7-Eleven stores in Denmark
K8s Tutorial: Use Polaris to Quickly Identify Kubernetes Security, Reliability and Efficiency Issues in Your Cluster
PreVeil Update: Cyber AB Enables Voluntary Assessments with Release of Draft CMMC Assessment Process (CAP)
Patch Tuesday Advisory – August 2022
Is it Illegal to Scrape a Website for Content?

Upcoming Webinars

Wed 17

Code Tampering: Four Keys to Pipeline Integrity

August 17 @ 1:00 pm - 2:00 pm
Mon 22

API Security

August 22 @ 1:00 pm - 2:00 pm
Wed 24

Implementing Identity Access Prioritization and Risk-Based Alerting for High-Fidelity Alerts

August 24 @ 1:00 pm - 2:00 pm
Tue 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

Managing the AppSec Toolstack

Industry Spotlight

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Editorial Calendar Featured Identity & Access Identity and Access Management Incident Response Industry Spotlight IoT & ICS Security Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

MiCODUS Car Trackers are SUPER Vulnerable and Dangerous

July 21, 2022 Richi Jennings | Jul 21 0
How AI Secures the Future of Digital Payments
Application Security Cloud Security Cybersecurity Data Security Industry Spotlight Security Boulevard (Original) 

How AI Secures the Future of Digital Payments

July 18, 2022 Natasha Lane | Jul 18 0
HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 Comments Off on HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

Top Stories

Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security DevOps Endpoint Featured Identity & Access Incident Response Malware Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Cisco Pwned by ‘Russian’ Gang — Data Leaked, Egg on Face

August 12, 2022 Richi Jennings | 2 days ago 0
Cowbell Cyber Allies With Swiss Re on AWS Cyberinsurance
Cyberlaw Cybersecurity Featured Governance, Risk & Compliance Incident Response News Security Awareness Security Boulevard (Original) Spotlight 

Cowbell Cyber Allies With Swiss Re on AWS Cyberinsurance

August 12, 2022 Michael Vizard | 2 days ago 0
OCSF Promises to Advance Cybersecurity Data Sharing
Cloud Security Cybersecurity Data Security Featured Network Security News Security Awareness Security Boulevard (Original) Spotlight 

OCSF Promises to Advance Cybersecurity Data Sharing

August 11, 2022 Michael Vizard | 3 days ago 0

Security Humor

XKCD ‘Coffee Cup Holes’

XKCD ‘Coffee Cup Holes’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.