The Infosec Student Part 2: DevOps is the Answer to Engagement Sprawl

Written by Daniel Deter on Friday, June 28th 2019 — Categories: DevOps, IT Operations, Security

If you’ve newly set foot on the path of an InfoSec student, you will benefit from understanding this topic. If you’ve been around awhile, you’ve lived it.  

There are two basic types of Information Security engagements in terms of how they are scoped. This is most applicable to managed services providers (MSPs), though it remains relevant to a practitioner supporting an internal corporate or public sector security team. For the sake of simplicity, I’m going to call them FFP and T&M. The purpose of this blog isn’t to dig deep into financial models, but rather to discuss, in a simplified manner, how they drive the delivery of work. And then, to discuss an alternative model.  

With both Fixed Firm Price and Time & Materials engagements – and really any other model of InfoSec contract scope – there are some overlapping goals and realities. 

Continue Reading...


The InfoSec Student Part 1: InfoSec Roles and Archetypes to Close the Skills Gap

Written by Daniel Deter on Tuesday, May 7th 2019 — Categories: DevOps, IT Operations, Security

It is generally understood, with broad industry concurrence, that an InfoSec skills gap exists and presents a significant challenge for those of us responsible for managing risk within an organization. To close the skills gap, an organization must first understand the competencies required by security teams in their pursuit of information technology risk management.

Information security consists of three core archetypes: builders, breakers, and defenders. It is through recruiting and building the skills of these archetypes that the foundations of highly functional security teams are formed.

Continue Reading...


Solving the InfoSec Risk Equation

Written by Daniel Deter on Thursday, November 15th 2018 — Categories: IT Operations, Security

With all the talk about cloud security threats, it’s important to remember that no matter where your data and applications reside, you should consider your data insecure.

Fundamentally, security isn’t a hyper-complex enterprise; It’s not, as they say, rocket science. It often feels that way, because the discipline is so broad in scope; encompassing both disparate technologies and governance frameworks. But, the vast majority of risk can be mitigated through adhering to basic foundational security.

More to know: A review of breaches outlined within the Verizon 2017 Data Breach Investigations Report (DBIR) against the Center for Internet Security (CIS) top 20 critical security controls found that:

• Adopting the first 5 controls could mitigate 85% of attacks, and
• Adopting all 20 controls could mitigate 97% of attacks.

That basic foundational security can be expressed in one essential formula, which boils down what is under your control as an IT security professional and what is outside your purview. That equation is as follows.

Continue Reading...


Understanding and Preventing SQL Injection (SQLi), One of the Most Common Attack Vectors

Written by Daniel Deter on Wednesday, October 17th 2018 — Categories: Cloud Storage, Security

Your data is your business. Your databases, and the data-driven applications that leverage them, should be regularly audited for vulnerabilities. One of the top risks facing your data today is SQL injection (SQLi). According to the 2018 Verizon Data Breach Incident Report (DBIR), SQLi was the second most common form of hacking varieties within information breaches, exceeded only by stolen credentials.

This attack vector involves the exploit of programmatic weaknesses in applications to run unintended code to manipulate your backend SQL databases, and thus access information or even gain administrative access and credentials.

Any application that uses SQL could be subject to this type of attack, from simple websites to SaaS apps like your CRM and ERP — even VoIP systems. This attack is also not limited to applications exposed to the internet. Internal applications are prime targets for attackers who have breached your external boundary (e.g., through phishing).

Continue Reading...


Hurricane Florence Preparations

Written by Daniel Deter on Wednesday, September 12th 2018

The Green House Data team is closely monitoring Hurricane Florence as the storm approaches landfall and will continue to monitor the storms’ progress. We've taken the following steps and precautions for the storm.

Continue Reading...

Chat Now