venturebeat.com Open in urlscan Pro
192.0.66.2  Public Scan

Submitted URL: https://protect-eu.mimecast.com/s/D171C76E2s2MGjO8uy_1MA?domain=click.checkpoint.com
Effective URL: https://venturebeat.com/security/all-i-really-need-to-know-about-cybersecurity-i-learned-in-kindergarten/?mkt_tok=NzUwLU...
Submission: On January 11 via api from ZA — Scanned from GB

Form analysis 1 forms found in the DOM

GET https://venturebeat.com/

<form method="get" action="https://venturebeat.com/" class="search-form" id="nav-search-form">
  <input id="mobile-search-input" class="" type="text" placeholder="Search" name="s" aria-label="Search" required="">
  <button type="submit" class="">
    <svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
      <g>
        <path fill-rule="evenodd" clip-rule="evenodd"
          d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
        </path>
      </g>
    </svg>
  </button>
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products. With your
permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
760 partners’ processing as described above. Alternatively you may access more
detailed information and change your preferences before consenting or to refuse
consenting. Please note that some processing of your personal data may not
require your consent, but you have a right to object to such processing. Your
preferences will apply to this website only. You can change your preferences at
any time by returning to this site or visit our privacy policy.
MORE OPTIONSAGREE

Skip to main content
Events Video Special Issues Jobs
VentureBeat Homepage

Subscribe

 * Artificial Intelligence
   * View All
   * AI, ML and Deep Learning
   * Auto ML
   * Data Labelling
   * Synthetic Data
   * Conversational AI
   * NLP
   * Text-to-Speech
 * Security
   * View All
   * Data Security and Privacy
   * Network Security and Privacy
   * Software Security
   * Computer Hardware Security
   * Cloud and Data Storage Security
 * Data Infrastructure
   * View All
   * Data Science
   * Data Management
   * Data Storage and Cloud
   * Big Data and Analytics
   * Data Networks
 * Automation
   * View All
   * Industrial Automation
   * Business Process Automation
   * Development Automation
   * Robotic Process Automation
   * Test Automation
 * Enterprise Analytics
   * View All
   * Business Intelligence
   * Disaster Recovery Business Continuity
   * Statistical Analysis
   * Predictive Analysis
 * More
   * Data Decision Makers
   * Virtual Communication
     * Team Collaboration
     * UCaaS
     * Virtual Reality Collaboration
     * Virtual Employee Experience
   * Programming & Development
     * Product Development
     * Application Development
     * Test Management
     * Development Languages


Subscribe Events Video Special Issues Jobs

Guest


ALL I REALLY NEED TO KNOW ABOUT CYBERSECURITY, I LEARNED IN KINDERGARTEN

Dan Wiley, Check Point
December 24, 2023 11:15 AM
 * Share on Facebook
 * Share on X
 * Share on LinkedIn

Dall-E/VentureBeat

Join leaders in San Francisco on January 10 for an exclusive night of
networking, insights, and conversation. Request an invite here.

--------------------------------------------------------------------------------



I’m often asked which of the latest headline-making technologies should
organizations be concerned about? Or what are the biggest threats or security
gaps causing IT and security teams to lose sleep at night? Is it the latest AI
technology? Triple extortion ransomware? Or a new security flaw in some
omnipresent software? 

And I reply that the truth is that breaches — even big, expensive,
reputation-tarnishing breaches — often happen because of simple, mundane things.
Like buying software, forgetting about it and neglecting it to the point that
it’s not patched and ready to be exploited by a threat actor, making your
company the low hanging fruit. 

1
/
2
Moving responsible AI forward as fast as AI
Read More

234.2K
1.2K




Video Player is loading.
Play Video
Unmute

Duration 0:00
/
Current Time 0:00
Playback Speed Settings
1x
Loaded: 0%

0:00

Remaining Time -0:00
 
FullscreenPlayUp Next

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Share
Playback Speed

0.25x
0.5x
1x Normal
1.5x
2x
Replay the list

TOP ARTICLES






 * Powered by AnyClip
 * Privacy Policy




Moving responsible AI forward as fast as AI


Nobody likes to brush their teeth and floss. But it’s that type of basic
personal hygiene that can save you thousands and even tens of thousands of
dollars in the long run. Cyber security hygiene is no different. Rules like
“clean up your mess” and “flush” are equally critical to maintaining a ‘healthy’
security posture.  

So as many head off on holiday break, I thought I’d share some hard-learned,
easy-to-understand rules from my 25 years of managing cyber security teams.
Inspired by Robert Fulghum’s book, All I Really Need to Know I Learned in
Kindergarten, this advice is equally applicable to novices and industry veterans
entrusted with their organization’s day-to-day IT and security operations.


VB EVENT

The AI Impact Tour

Getting to an AI Governance Blueprint – Request an invite for the Jan 10 event.

 


Learn More


1: FLUSH…AND CLEAN UP YOUR OWN MESS

In IT operations and maintenance, as in personal hygiene, you’re responsible for
cleaning up after yourself. If you buy a piece of software, don’t let it stand
and rot in a virtual corner. Make sure you have an established routine to keep
informed on the latest threats, run regular vulnerability scans and manage the
patching of your systems (including networks, clouds, applications and devices).

advertisement



2: TRUST BUT VERIFY

When it comes to colleagues, your direct reports, vendors you’re doing business
with and even customers, we all want to trust the people we interact with. But
can we? In the age of quick online transactions, whether social or
enterprise-related, err on the side of caution. Verify the person you’re dealing
with is real, that backgrounds check out and get references when you can. Trust
but verify. 


3: LOOK AND PAY ATTENTION

Incident management might feel laborious and mundane. But security incidents,
like a suspicious email or phish-y link or shady executable aren’t a big deal
until they become a big deal. With stealth mechanisms meant to keep things quiet
and ‘boring,’ it’s all the more reason to take a good look when something
doesn’t smell right.

advertisement



4: IF YOU BUY SOMETHING, YOU’RE RESPONSIBLE FOR IT

No one will write a poem about the beauty of software lifecycle management.
Still, whether it’s cloud products like IaaS or SaaS applications, you need to
make sure your products are being maintained, updated and patched. It’s just
like buying a car: You buy insurance, get your tires checked and get an
inspection sticker to certify it’s ‘drivable.’ In IT, if you buy it, make sure
it’s maintained and in good shape. 


5: TAKE COMFORT IN SOMEONE OR SOMETHING

We all need a way to unwind — even more so if you’re in a high strung
IT/security job. Opt for a way to let off some steam that doesn’t compromise
your health. (Here are some of my favorites: Music, warm tea, a long walk, hot
chocolate, friends, naps, my preferred video channels.)


6: DON’T TAKE THINGS THAT AREN’T YOURS

If you’re in a position to access or even exploit other systems or someone’s
data as part of your incident analysis and investigation work, remember to play
by the rules. Stay on the right side of the law. Don’t take offensive security
measures and don’t retaliate. And don’t take things that aren’t yours. 

advertisement



7: PLAY FAIR, DON’T HIT PEOPLE

Other companies and vendors will mess up. Stay respectful on the internet. And
mind your comments. (Or how a friend once put it to me: “You have to say what
you mean, and mean what you say. But never be mean.”)


8: WHEN YOU GO OUT INTO THE WORLD, WATCH OUT FOR TRAFFIC, HOLD HANDS AND STICK
TOGETHER

When you’re handling a high-severity incident, it may be easy to forget about
the people on your team. Remember that humans are the weakest links. As your
team races against time to get to the bottom of an attack and stop it, remember
that you can only push people so far before they break. I’ve seen workers have a
mental breakdown, owing to the psychological weight of an incident. So, when you
head out into the wild, be there for each other and support your team.

advertisement



9: SHARE EVERYTHING, INCLUDING KNOWLEDGE AND TRAINING

If you hire staff, you need to educate them. Whether they’re the SOC team or
Sally from HR. Everyone needs to know the rules. Make sure you’re running
regular awareness training. And if you have a security operations squad, set
regular table top exercises, such as red team-blue team contests and breach and
attack simulations.  

Dan Wiley is head of threat management and chief security advisor at Check Point
Software Technologies.


DATADECISIONMAKERS

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data
work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best
practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even consider contributing an article of your own!

Read More From DataDecisionMakers




THE AI IMPACT TOUR

Join us in San Francisco for an invitation-only evening of networking and
insights at our exclusive event: "Getting to an AI Governance Blueprint."

Request an Invite


 * DataDecisionMakers
 * Follow us on Facebook
 * Follow us on X
 * Follow us on LinkedIn
 * Follow us on RSS

 * Press Releases
 * Contact Us
 * Advertise
 * Share a News Tip
 * Contribute to DataDecisionMakers

 * Privacy Policy
 * Terms of Service
 * Do Not Sell My Personal Information

© 2024 VentureBeat. All rights reserved.