Peerlyst crowd-sources security tips

Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInEmail this to someonePrint this page

By Frank J. Ohlhorst, Spe­cial to Peerlyst

When fight­ing cyber­in­vaders, Peerlyst believes it takes a village.

The net­work of IT secu­ri­ty pro­fes­sion­als incor­po­rates a think-tank approach to spread­ing infor­ma­tion about poten­tial prob­lems. Mem­bers share the lat­est intel­li­gence on attacks and cri­tique the prod­ucts and method­olo­gies used to com­bat the lat­est cyberthreats.

Peerlyst, which offers free mem­ber­ship, fea­tures secu­ri­ty blogs, prod­uct reviews, indus­try Q&As and advice.

Free resource: Stay informed with a free sub­scrip­tion to Secu­ri­ty & Pri­va­cy Week­ly News Roundup

Our goal is to make our mem­bers’ jobs eas­i­er by giv­ing them a place to find and com­pare secu­ri­ty solu­tions — and learn from their peers’ real‐world expe­ri­ences,” says Peerlyst founder Limor Elbaz. “Peerlyst is the place where secu­ri­ty pros can instant­ly con­nect with each oth­er, rate and learn about prod­ucts, secure­ly col­lab­o­rate on projects, grow their exper­tise and dis­cov­er new career opportunities.”

Limor Elbaz
Limor Elbaz

Indus­tries and gov­ern­ment agen­cies could great­ly improve their cyber­se­cu­ri­ty mea­sures through active col­lab­o­ra­tion, says Guy Delp, direc­tor of Cyber and Data Ana­lyt­ics at Lock­heed Mar­tin. A recent Lock­heed sur­vey showed that most infor­ma­tion tech­nol­o­gy lead­ers aren’t com­fort­able with their orga­ni­za­tions’ abil­i­ty to use the nec­es­sary intel­li­gence mea­sures to pre­dict and react to cyberthreats.

We believe that many orga­ni­za­tions don’t feel con­fi­dent in their cyber­se­cu­ri­ty mea­sures because they lack the prop­er fund­ing and staffing to iden­ti­fy and man­age attacks,” Delp says. “Our sur­vey indi­cates threats across all indus­tries, as well as across the gov­ern­ment, are on the rise. While the spe­cif­ic goals of each attack may dif­fer … in many cas­es, the tech­niques used … are sim­i­lar and there­fore, require a robust defen­sive pos­ture that relies on collaboration.”

Peerlyst has pub­lished sev­er­al best-prac­tices pieces on how to deal with the threats that are fac­ing enter­pris­es today. Case in point, a dis­cus­sion on the site start­ed by mem­ber Jeff Stead­man brought forth some best prac­tices for iden­ti­ty and access man­age­ment. Mem­ber Paul Dube, co-founder of BioSec AC, found that extreme­ly valu­able. “It is crit­i­cal for enter­pris­es to gar­ner own­er­ship of the iden­ti­ty-man­age­ment process, and Jeff’s tips help to bridge that gap,” Dube said.

The idea behind our com­mu­ni­ty is to build col­lab­o­ra­tion between secu­ri­ty pro­fes­sion­als, allow­ing the cre­ation of a secu­ri­ty town hall, where ideas and suc­cess­es, as well as fail­ures can be shared for the ben­e­fit of all,” Elbaz says.

In addi­tion to col­lab­o­rat­ing on defen­sive strate­gies, Peerlyst also offers mem­bers access to prod­uct secu­ri­ty test­ing, such as Ixia’s Break­ing­Point VE, a soft­ware appli­ca­tion that can test the resilience of secu­ri­ty solu­tions. Mem­bers can review and rate secu­ri­ty solu­tions “with­out undue influ­ence from ven­dors,” Elbaz says.

 


Posted in Cybersecurity, Data Security, Featured Story