Peerlyst crowd-sources security tips
By Frank J. Ohlhorst, Special to Peerlyst
When fighting cyberinvaders, Peerlyst believes it takes a village.
The network of IT security professionals incorporates a think-tank approach to spreading information about potential problems. Members share the latest intelligence on attacks and critique the products and methodologies used to combat the latest cyberthreats.
Peerlyst, which offers free membership, features security blogs, product reviews, industry Q&As and advice.
“Our goal is to make our members’ jobs easier by giving them a place to find and compare security solutions — and learn from their peers’ real‐world experiences,” says Peerlyst founder Limor Elbaz. “Peerlyst is the place where security pros can instantly connect with each other, rate and learn about products, securely collaborate on projects, grow their expertise and discover new career opportunities.”
Industries and government agencies could greatly improve their cybersecurity measures through active collaboration, says Guy Delp, director of Cyber and Data Analytics at Lockheed Martin. A recent Lockheed survey showed that most information technology leaders aren’t comfortable with their organizations’ ability to use the necessary intelligence measures to predict and react to cyberthreats.
“We believe that many organizations don’t feel confident in their cybersecurity measures because they lack the proper funding and staffing to identify and manage attacks,” Delp says. “Our survey indicates threats across all industries, as well as across the government, are on the rise. While the specific goals of each attack may differ … in many cases, the techniques used … are similar and therefore, require a robust defensive posture that relies on collaboration.”
Peerlyst has published several best-practices pieces on how to deal with the threats that are facing enterprises today. Case in point, a discussion on the site started by member Jeff Steadman brought forth some best practices for identity and access management. Member Paul Dube, co-founder of BioSec AC, found that extremely valuable. “It is critical for enterprises to garner ownership of the identity-management process, and Jeff’s tips help to bridge that gap,” Dube said.
“The idea behind our community is to build collaboration between security professionals, allowing the creation of a security town hall, where ideas and successes, as well as failures can be shared for the benefit of all,” Elbaz says.
In addition to collaborating on defensive strategies, Peerlyst also offers members access to product security testing, such as Ixia’s BreakingPoint VE, a software application that can test the resilience of security solutions. Members can review and rate security solutions “without undue influence from vendors,” Elbaz says.