While VPNs do function well when it comes to tunneling and encrypting data from authorized users, there are a couple of significant catches. Is software defined perimeter (SDP) the answer?
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
For organizations faced with highly sophisticated and targeted attacks from well-resourced cybercrime groups, standard AV and EDR platforms are of little use against ransomware.
Instead of only focusing solely on how to protect the existing environments, CISOs must also aim to provide the right environment for secure business innovation.
Learn why our brains are destined to eventually fall for phishing attacks and how cybercriminals have adapted to modern work practices to make phishing emails more successful.
The DOJ elevated the priority of ransomware attacks, comparing them to terrorism and directing U.S. Attorneys to coordinate investigations through the ransomware task force.
The operation disrupted Russian GRU control over infected devices by removing Cyclops Blink botnet malware from the infected WatchGuard Firebox devices used as command-and-control (C2) servers.
FBI is issuing more cyber security alerts than usual, covering human trafficking, COVID-19 scams, vulnerabilities in networking platforms and cloud-based business email compromise campaigns.
Companies globally are facing a shortage in cybersecurity talent that could be managed through training with the four Es, i.e. education, efficiency, embracing and engagement, in mind.
The FTC is a shadow regulator on cyber, and it is impacting what businesses must do about cybersecurity. Most troublingly, it is doing so without clear standards and in apparent self-denial. This may have wide-ranging ramifications for the future of self-driving cars.
Bio-cybersecurity is not to be taken lightly as data breach could lead to healthcare companies buying back patient data from ransomware or hackers using stolen genetic data to blackmail individuals.