{"id":4401,"date":"2021-05-25T10:14:14","date_gmt":"2021-05-25T09:14:14","guid":{"rendered":"https:\/\/www.adarma.com\/?p=4401"},"modified":"2023-08-17T09:25:08","modified_gmt":"2023-08-17T09:25:08","slug":"prioritising-the-dynamic-re-organisation-of-defence","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/","title":{"rendered":"Prioritising the Dynamic Re-organisation of Defence"},"content":{"rendered":"

It\u2019s become something of a clich\u00e9 for cybersecurity vendors and service providers to write ominously about the looming imminence of successful cyber-attacks against organisations \u2013 it\u2019s now a matter of not if, but when the phrase \u201cit\u2019s not if, but when\u201d will turn up in any given bit of marketing material!<\/strong><\/p>\n

Unfortunately, this is one of those clich\u00e9s that, if no silver bullet, is worth its weight in gold. \u201cComedy\u201d aside, it\u2019s both a) true and b) worth paying attention to. Even in the last couple of weeks (at time of writing), we\u2019ve seen major ransomware attacks making global headlines \u2013 the Colonial Pipeline attack in Virginia, USA (rumoured to have cost somewhere in the region of $4 million to resolve by paying the attackers), and in the Irish Health Service which has resulted in IT systems being shut down for days.<\/p>\n

The success of these attacks doesn\u2019t illustrate a lack of investment in cybersecurity by boards (Gartner, for example, predicts a continuing year-on-year investment of up to 10% through 2021 and beyond) but rather an incomplete understanding of risk, a reliance on static defence (firewalls, IDS\/IPS brittle controls, AV, etc), brittle controls, and a failure to gather and utilise threat intelligence \u2013 then proactively act on it.<\/p>\n

Fortunately, there are ways to rectify the situation, and SecOps teams have a key role to play in making it happen: a shift to Active Defence. It\u2019s not a new idea \u2013 even as far back as 2004, national cyber defence agencies were insisting that \u201cstatic defence is inadequate\u201d \u2013 or even necessarily novel ideas \u2013 but a combination of the post-pandemic threat landscape, the democratisation of threat as malign actors increasingly set themselves up as a kind of mirror universe cyber services provider, and the maturation of both market and technology means that it\u2019s an idea that\u2019s time, to borrow another clich\u00e9, has finally come.<\/p>\n

By understanding what business services and assets are defending \u2013 and why they\u2019re critical \u2013 building a threat profile of likely attacks and attackers becomes a manageable task, and this combination of business insight and intelligence gives a baseline position from which current control and capability effectiveness can be assessed. But to effectively counter identified threats as they evolve, and avoid control drift, dynamic re-organisation of defence is critical \u2013 monitoring threat intelligence, continuous assessment of risk surfaces, and a proactive adaptation of your defence in line with your intelligence.<\/p>\n

Adarma\u2019s threat intelligence experts delve into the basics of Active Defence, an overview of the important techniques of Dynamic Risk Assessment, Denying Threats, Detecting Threats, Disrupting Threats, and Deceiving Threats, and an insight into minimum capabilities and methods for utilising your existing investments in the white paper \u201cActive Defence for Security Operations Teams.<\/a>\u201d<\/strong><\/span><\/p>\n

Read the whitepaper and let us know what you think \u2013 and how we can help.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

It\u2019s become something of a clich\u00e9 for cybersecurity vendors and service providers to write ominously about the looming imminence of successful cyber-attacks against organisations \u2013 it\u2019s now a matter of not if, but when the phrase \u201cit\u2019s not if, but when\u201d will turn up in any given bit of marketing material! Unfortunately, this is one […]<\/p>\n","protected":false},"author":1,"featured_media":5502,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[],"acf":[],"yoast_head":"\nDynamic Re-organisation of Defence | News & Blogs | Adarma<\/title>\n<meta name=\"description\" content=\"By understanding what business services are defending and why they\u2019re critical, building a threat profile of likely attacks and attackers becomes a manageable task.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Prioritising the Dynamic Re-organisation of Defence\" \/>\n<meta property=\"og:description\" content=\"By understanding what business services are defending and why they\u2019re critical, building a threat profile of likely attacks and attackers becomes a manageable task.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/\" \/>\n<meta property=\"og:site_name\" content=\"Adarma\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-25T09:14:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-17T09:25:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/11\/killian-cartignies-oKb2_15Uc8w-unsplash-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pnpd-admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@adarma_security\" \/>\n<meta name=\"twitter:site\" content=\"@adarma_security\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pnpd-admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/\"},\"author\":{\"name\":\"pnpd-admin\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc\"},\"headline\":\"Prioritising the Dynamic Re-organisation of Defence\",\"datePublished\":\"2021-05-25T09:14:14+00:00\",\"dateModified\":\"2023-08-17T09:25:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/\"},\"wordCount\":479,\"publisher\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#organization\"},\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/\",\"url\":\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/\",\"name\":\"Dynamic Re-organisation of Defence | News & Blogs | Adarma\",\"isPartOf\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#website\"},\"datePublished\":\"2021-05-25T09:14:14+00:00\",\"dateModified\":\"2023-08-17T09:25:08+00:00\",\"description\":\"By understanding what business services are defending and why they\u2019re critical, building a threat profile of likely attacks and attackers becomes a manageable task.\",\"breadcrumb\":{\"@id\":\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/adarma.wpengine.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Prioritising the Dynamic Re-organisation of Defence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/adarma.wpengine.com\/#website\",\"url\":\"https:\/\/adarma.wpengine.com\/\",\"name\":\"Adarma\",\"description\":\"Cybersecurity Services Tailored to Your Needs\",\"publisher\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/adarma.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/adarma.wpengine.com\/#organization\",\"name\":\"Adarma\",\"url\":\"https:\/\/adarma.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg\",\"contentUrl\":\"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg\",\"width\":1,\"height\":1,\"caption\":\"Adarma\"},\"image\":{\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/adarma_security\",\"https:\/\/www.linkedin.com\/company\/adarma-security\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc\",\"name\":\"pnpd-admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/adarma.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g\",\"caption\":\"pnpd-admin\"},\"sameAs\":[\"https:\/\/adarma.wpengine.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Dynamic Re-organisation of Defence | News & Blogs | Adarma","description":"By understanding what business services are defending and why they\u2019re critical, building a threat profile of likely attacks and attackers becomes a manageable task.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/","og_locale":"en_GB","og_type":"article","og_title":"Prioritising the Dynamic Re-organisation of Defence","og_description":"By understanding what business services are defending and why they\u2019re critical, building a threat profile of likely attacks and attackers becomes a manageable task.","og_url":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/","og_site_name":"Adarma","article_published_time":"2021-05-25T09:14:14+00:00","article_modified_time":"2023-08-17T09:25:08+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/11\/killian-cartignies-oKb2_15Uc8w-unsplash-1024x683.jpg","type":"image\/jpeg"}],"author":"pnpd-admin","twitter_card":"summary_large_image","twitter_creator":"@adarma_security","twitter_site":"@adarma_security","twitter_misc":{"Written by":"pnpd-admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/#article","isPartOf":{"@id":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/"},"author":{"name":"pnpd-admin","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc"},"headline":"Prioritising the Dynamic Re-organisation of Defence","datePublished":"2021-05-25T09:14:14+00:00","dateModified":"2023-08-17T09:25:08+00:00","mainEntityOfPage":{"@id":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/"},"wordCount":479,"publisher":{"@id":"https:\/\/adarma.wpengine.com\/#organization"},"articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/","url":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/","name":"Dynamic Re-organisation of Defence | News & Blogs | Adarma","isPartOf":{"@id":"https:\/\/adarma.wpengine.com\/#website"},"datePublished":"2021-05-25T09:14:14+00:00","dateModified":"2023-08-17T09:25:08+00:00","description":"By understanding what business services are defending and why they\u2019re critical, building a threat profile of likely attacks and attackers becomes a manageable task.","breadcrumb":{"@id":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/adarma.wpengine.com\/prioritising-the-dynamic-re-organisation-of-defence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adarma.wpengine.com\/"},{"@type":"ListItem","position":2,"name":"Prioritising the Dynamic Re-organisation of Defence"}]},{"@type":"WebSite","@id":"https:\/\/adarma.wpengine.com\/#website","url":"https:\/\/adarma.wpengine.com\/","name":"Adarma","description":"Cybersecurity Services Tailored to Your Needs","publisher":{"@id":"https:\/\/adarma.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adarma.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/adarma.wpengine.com\/#organization","name":"Adarma","url":"https:\/\/adarma.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg","contentUrl":"https:\/\/adarma.wpengine.com\/wp-content\/uploads\/2021\/09\/Logo-Dark.svg","width":1,"height":1,"caption":"Adarma"},"image":{"@id":"https:\/\/adarma.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/adarma_security","https:\/\/www.linkedin.com\/company\/adarma-security\/"]},{"@type":"Person","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/person\/ef0653c33d69815507d6cc37594e33dc","name":"pnpd-admin","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/adarma.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8db9b99d79fb7b848980de57cb219c57?s=96&d=mm&r=g","caption":"pnpd-admin"},"sameAs":["https:\/\/adarma.wpengine.com"]}]}},"_links":{"self":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/posts\/4401"}],"collection":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/comments?post=4401"}],"version-history":[{"count":0,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/posts\/4401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/media\/5502"}],"wp:attachment":[{"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/media?parent=4401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/categories?post=4401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adarma.wpengine.com\/wp-json\/wp\/v2\/tags?post=4401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}