A Process for Testing Email Security
Ed Amoroso recommends Mimecast's most recent ESRA as a case study in effective email security testing. #cybersecurity

A Process for Testing Email Security

Mimecast’s recent Email Security Risk Assessment (ESRA) is a great read on the topic of threats to email (not to mention including a nice infographic suitable for printing and framing). Let me provide here a brief summary of how the Mimecast team executes ESRA tests, which it has been doing for the past couple of years. Their fine process illustrates how source selection or review might be performed for any number of email security offers.

Mimecast’s report specifically highlights instances of threats that bypassed their competitors, but are detected by their system. I’ve always felt that such marketing use-cases were reasonable to report, so long as the tests are repeatable. While I have not re-done any of the reported testing in my own lab, I’ve spent considerable time with the Mimecast team discussing the process and output, and I’m convinced that both are sound.

ESRA tests consist of analysis performed over a few weeks to a month by organizations using their live traffic of inbound emails, versus synthetically generated streams. Certainly, this could bias results, but it also provides a measure of realism to the testing (the inbound mail is exactly what the organization is receiving). Organizations run their ESRA tests, which consist of passive inspections to record any detected security problems.

The types of email threats investigated in ESRA tests include inspecting for Spam, phishing, malware, and malicious URLs. A more specific use case example includes searching for sender impersonation attacks that rely on public information to trick a recipient into side-stepping a protection process, such as an internal approval. (As you’d guess, Mimecast detects such attacks accurately and effectively in part by using Active Directory look-ups.)

Other attacks that Mimecast detects include credential stealing using domains adjacent to known brands, as well as supply chain attacks to plant a malware base by pretending to be a trusted business partner. While Mimecast offers these results as part of their marketing, interested readers can also learn from the process and re-use the attack tests for their own source selection, or to improve understanding of the most challenging email-borne attacks.

Regardless of where you are in your email security lifecycle, I suggest you review the ESRA report and go through the material (including the infographic). It’s a good case study in security testing (not to mention product marketing), so your time will be well-spent with the material. As always, I sure do hope you’ll share back your experiences and understandings after reviewing the report. I hope to hear from you.

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    7 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了