<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cybersecurity Technology Efficacy in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Cybersecurity-Technology-Efficacy/m-p/43210#M5304</link>
    <description>&amp;gt; tmekelburg1 (Contributor II) posted a new topic in Industry News on 02-11-2021&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I was listening to the Cyber Risk Management Podcast and the topic of discussion&lt;BR /&gt;&amp;gt; was cybersecurity product efficacy.&lt;BR /&gt;&lt;BR /&gt;Which basically turns on our old friends, functional versus assurance requirements.&lt;BR /&gt;(I think the earliest formal treatment of those was in the Common Criteria.)&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Is cybersecurity the new "market for lemons"?&lt;BR /&gt;&lt;BR /&gt;Of course, in general that's just a restatement of our old friend "security snake&lt;BR /&gt;oil." We've always been a huge market for, if not outright hucksters, at least&lt;BR /&gt;those who keep creating new "marketing" terms for stuff that has long been used.&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
    <pubDate>Thu, 11 Feb 2021 17:11:37 GMT</pubDate>
    <dc:creator>rslade</dc:creator>
    <dc:date>2021-02-11T17:11:37Z</dc:date>
    <item>
      <title>Cybersecurity Technology Efficacy</title>
      <link>https://community.isc2.org/t5/Industry-News/Cybersecurity-Technology-Efficacy/m-p/43206#M5303</link>
      <description>&lt;P&gt;I was listening to the &lt;A title="https://www.cyberriskopportunities.com/the-failure-of-the-cybersecurity-market/" href="https://www.cyberriskopportunities.com/the-failure-of-the-cybersecurity-market/" target="_blank" rel="noopener"&gt;Cyber Risk Management Podcast&lt;/A&gt; and the topic of discussion was cybersecurity product efficacy. Check it out on your next lunch break. They referenced a report released by Debate Security called &lt;A title="https://www.debatesecurity.com/downloads/Cybersecurity-Technology-Efficacy-Research-Report-V1.0.pdf" href="https://www.debatesecurity.com/downloads/Cybersecurity-Technology-Efficacy-Research-Report-V1.0.pdf" target="_blank" rel="noopener"&gt;Cybersecurity Technology Efficacy: Is cybersecurity the new "market for lemons"?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The report has a little of something for everyone but my key takeaway was a standard way to define efficacy for products. One of the ways discussed in the podcast was, as a vendor, to have your products evaluated by a third party like &lt;A title="https://attackevals.mitre-engenuity.org/" href="https://attackevals.mitre-engenuity.org/" target="_blank" rel="noopener"&gt;MITRE's ATT&amp;amp;CK Evaluations&lt;/A&gt;. Further thoughts on the matter? Agree or disagree with anything in the report?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Efficacy&lt;/STRONG&gt; -&amp;nbsp;defined by four characteristics:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Capability&lt;/STRONG&gt; -&amp;nbsp;When properly installed and configured, how well does the solution deliver its stated security mission? Is it fit for purpose?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Practicality&lt;/STRONG&gt; -&amp;nbsp;How easy is it for organizations to implement, integrate, operate and maintain? Is it fit for use?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Quality&lt;/STRONG&gt; -&amp;nbsp;How well designed and built is the solution to avoid vulnerabilities and negative impact?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Provenance&lt;/STRONG&gt; -&amp;nbsp;How much security risk is there in the vendor and it’s supply chain, based on how they work and who they are?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 15:04:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cybersecurity-Technology-Efficacy/m-p/43206#M5303</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-02-11T15:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cybersecurity Technology Efficacy</title>
      <link>https://community.isc2.org/t5/Industry-News/Cybersecurity-Technology-Efficacy/m-p/43210#M5304</link>
      <description>&amp;gt; tmekelburg1 (Contributor II) posted a new topic in Industry News on 02-11-2021&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I was listening to the Cyber Risk Management Podcast and the topic of discussion&lt;BR /&gt;&amp;gt; was cybersecurity product efficacy.&lt;BR /&gt;&lt;BR /&gt;Which basically turns on our old friends, functional versus assurance requirements.&lt;BR /&gt;(I think the earliest formal treatment of those was in the Common Criteria.)&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Is cybersecurity the new "market for lemons"?&lt;BR /&gt;&lt;BR /&gt;Of course, in general that's just a restatement of our old friend "security snake&lt;BR /&gt;oil." We've always been a huge market for, if not outright hucksters, at least&lt;BR /&gt;those who keep creating new "marketing" terms for stuff that has long been used.&lt;BR /&gt;&lt;BR /&gt;======================&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;"If you do buy a computer, don't turn it on." - Richards' 2nd Law&lt;BR /&gt;"Robert Slade's Guide to Computer Viruses" 0-387-94663-2&lt;BR /&gt;"Viruses Revealed" 0-07-213090-3&lt;BR /&gt;"Software Forensics" 0-07-142804-6&lt;BR /&gt;"Dictionary of Information Security" Syngress 1-59749-115-2&lt;BR /&gt;"Cybersecurity Lessons from CoVID-19" CRC Press 978-0-367-68269-9&lt;BR /&gt;============= for back issues:&lt;BR /&gt;[Base URL] site &lt;A href="http://victoria.tc.ca/techrev/" target="_blank"&gt;http://victoria.tc.ca/techrev/&lt;/A&gt;&lt;BR /&gt;CISSP refs: [Base URL]mnbksccd.htm&lt;BR /&gt;PC Security: [Base URL]mnvrrvsc.htm&lt;BR /&gt;Security Dict.: [Base URL]secgloss.htm&lt;BR /&gt;Security Educ.: [Base URL]comseced.htm&lt;BR /&gt;Book reviews: [Base URL]mnbk.htm&lt;BR /&gt;[Base URL]review.htm&lt;BR /&gt;Partial/recent: &lt;A href="http://groups.yahoo.com/group/techbooks/" target="_blank"&gt;http://groups.yahoo.com/group/techbooks/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://en.wikipedia.org/wiki/Robert_Slade" target="_blank"&gt;http://en.wikipedia.org/wiki/Robert_Slade&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt; &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;</description>
      <pubDate>Thu, 11 Feb 2021 17:11:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Cybersecurity-Technology-Efficacy/m-p/43210#M5304</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-02-11T17:11:37Z</dc:date>
    </item>
  </channel>
</rss>

