Updated News Around the World

Tech, Cyber Companies Launch Security Standard to Monitor Hacking Attempts

A group of 18 tech and cyber companies said Wednesday they are building a common data standard for sharing cybersecurity information. They aim to fix a problem for corporate security chiefs who say that cyber products often don’t integrate, making it hard to fully assess hacking threats.

Amazon.

com Inc.’s AWS cloud business, cybersecurity company

Splunk Inc.

and International Business Machines Corp.’s security unit, among others, launched the Open Cybersecurity Schema Framework, or OCSF, Wednesday at the Black Hat USA cybersecurity conference in Las Vegas.

Products and services that support the OCSF specifications would be able to collate and standardize alerts from different cyber monitoring tools, network loggers and other software, to simplify and speed up the interpretation of that data, said Patrick Coughlin, Splunk’s group vice president of the security market. “Folks expect us to figure this out. They’re saying, ‘We’re tired of complaining about the same challenges.’”

Other companies involved in the initiative are

CrowdStrike Holdings Inc.,

Rapid7 Inc.,

Palo Alto Networks Inc.,

Cloudflare Inc.,

DTEX Systems Inc.,

IronNet Inc.,

JupiterOne Inc.,

Okta Inc.,

Salesforce Inc.,

Securonix Inc.,

Sumo Logic Inc.,

Tanium Inc.,

Zscaler Inc.

and Trend Micro Inc.

Chief information security officers have grumbled about proprietary cyber products that force security teams to integrate data manually. More than three-quarters of 280 security professionals surveyed want to see vendors build open standards into their products to enable interoperability, according to research from the Information Systems Security Association and

TechTarget Inc.’s

analyst unit published in July.

Often, cyber teams build several dashboards to monitor items such as attempted logins and unusual network activity. To get a full picture of events, they frequently have to write custom code to reformat data for one dashboard or analysis tool or another, said Mark Ryland, director of the office of the CISO at AWS. “There’s a lot of custom software out there in the security world,” he said.

Products that support OCSF would be able to share information in one dashboard without that manual labor, Mr. Ryland said. “We’ll benefit from this,” he said of AWS’s internal security teams.

Tech providers writing the initial version of OCSF expect to incorporate it into their products in the coming months, said Chris Niggel, regional chief security officer for the Americas at identity management company Okta.

Internally, Okta uses cloud services from

Alphabet Inc.’s

Google, human resources company

Workday Inc.,

communications tool Slack Inc. and others, Mr. Niggel said. “Our incident response team has to normalize all that information so they can see what’s happening,” he said.

With data about potential hacking activity in one format, internal teams will be able to recognize attacks earlier, he said. Plus, companies will be able to share incident data with each other faster, he added.

The OCSF standard and documentation will be on the GitHub open-source repository. Early work on the project began years ago at

Symantec,

now part of infrastructure technology company

Broadcom Inc.

Write to Kim S. Nash at [email protected]

Copyright ©2022 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! NewsUpdate is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.