Tools & TutorialsMEDIUM

Tools - JSOC IT Launches AUTOPSY for Security Verification

🎯

Basically, AUTOPSY checks if your security tools are really working before a breach happens.

Quick Summary

JSOC IT has launched AUTOPSY, a new platform for real-time security verification. It replaces outdated self-reported assessments with live API data. This proactive tool helps organizations uncover critical vulnerabilities before breaches occur.

What Happened

JSOC IT has introduced a groundbreaking platform called AUTOPSY. This platform focuses on security verification by investigating an organization’s security stack through live API integrations. Unlike traditional methods that often rely on self-reported assessments, AUTOPSY aims to identify vulnerabilities before a breach occurs. The flagship product, READY, replaces outdated questionnaires with real-time, API-verified telemetry across various security domains.

The CEO of JSOC IT, Sam Sawalhi, emphasizes the need for this innovation. He points out that many organizations operate on an 'honor system,' where they report their security posture without actual verification. AUTOPSY aims to change this narrative by providing a detailed investigation into the security measures organizations claim to have in place.

Who's Affected

The launch of AUTOPSY is particularly relevant for organizations across various sectors, especially those that are heavily regulated. The platform's findings reveal a concerning trend: the Readiness Gap—the difference between what a Chief Information Security Officer (CISO) believes about their security environment and what AUTOPSY verifies. In many cases, this gap averages between 20 to 35 percentage points.

For instance, during a recent engagement with a mid-market financial services firm, AUTOPSY uncovered significant issues that had previously gone unnoticed. These included silent endpoint detection failures, untested backup infrastructures, and dormant privileged accounts. Such vulnerabilities could have been exploited by attackers, highlighting the critical need for continuous verification.

What Data Was Exposed

The findings from AUTOPSY are alarming, showcasing a stark contrast between self-reported security assessments and actual security realities. For example, one organization reported a self-assessed security score of 87, yet the verified score from the READY assessment was only 61. This discrepancy underscores the importance of real-time data verification in maintaining a secure environment.

Key findings from the assessment included:

  • Silent EDR coverage failure: 23% of endpoints had no alerts due to sensor failures.
  • MFA exclusions: Legacy applications were not enforcing multi-factor authentication, exposing them to potential threats.
  • Untested backup infrastructure: Backups had not been validated in over a year, leaving data vulnerable.
  • Dormant privileged accounts: Several inactive admin accounts remained active, including those of former employees.

What You Should Do

Organizations should consider adopting platforms like AUTOPSY to enhance their security posture proactively. The three-phase engagement model includes:

  1. The AUTOPSY: READY assessment: This phase quantifies the Readiness Gap and delivers a forensic report.
  2. The Rebuild: Engineers from JSOC IT assist in remediating identified vulnerabilities.
  3. Always On: Continuous monitoring ensures that the organization's security posture remains verified and not assumed.

In a world where cyber threats are ever-evolving, relying on self-reported metrics is no longer sufficient. Organizations must embrace tools like AUTOPSY to ensure their defenses are robust and effective. As Sawalhi aptly puts it, "Deployed is not the same as defended."

🔒 Pro insight: AUTOPSY's API-driven approach could redefine security assessments, shifting the focus from compliance to actual security effectiveness.

Original article from

Help Net Security · Industry News

Read Full Article

Related Pings

MEDIUMTools & Tutorials

Stellar Cyber 6.4.0 - Enhancing SOC with Autonomous Capabilities

Stellar Cyber has launched version 6.4.0, enhancing its platform with Autonomous SOC capabilities. This update helps security teams reduce alert noise and speed up investigations. With AI-driven tools, analysts can focus on critical incidents, improving overall efficiency and response times.

Help Net Security·
LOWTools & Tutorials

File Shredder - Permanently Delete Files with Confidence

Malwarebytes introduces File Shredder to ensure deleted files are permanently erased. This tool is essential for anyone concerned about data recovery and privacy. With multiple shredding levels, it caters to varying security needs, making it a must-have for sensitive information management.

Malwarebytes Labs·
LOWTools & Tutorials

Elastic Security - Get Started with Your AI Agent Today

Elastic Security has launched open-source Agent Skills for AI agents. This lets users set up a security environment quickly, enhancing their security capabilities. Explore how these skills can streamline your security processes and improve efficiency.

Elastic Security Labs·
MEDIUMTools & Tutorials

Betterleaks - New Open-Source Tool for Secrets Scanning

Introducing Betterleaks, a new open-source tool for scanning exposed credentials in directories and Git repositories. Developed by the creator of Gitleaks, it offers enhanced speed and accuracy. This tool is essential for developers and security teams aiming to protect sensitive information effectively.

Cyber Security News·
MEDIUMTools & Tutorials

Security Validation - Embracing Agentic AI for Efficiency

Security validation is evolving with the introduction of Agentic AI, streamlining threat detection. Organizations can now unify their security tools for better efficiency. This shift is crucial for staying ahead of modern cyber threats.

The Hacker News·
MEDIUMTools & Tutorials

VulHunt - New Open-source Vulnerability Detection Tool Released

Binarly has released VulHunt Community Edition, an open-source tool for detecting software vulnerabilities. This framework is perfect for independent researchers looking to enhance security. With its multi-format support, it simplifies vulnerability detection and analysis.

Help Net Security·