Cyber Defense Magazine Special Annual Edition for RSA Conference 2021
Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.
Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
presence consists of, also known as your attack surface. How can you make your attack surface as small,<br />
flexible and secure as possible?<br />
The Sweepatic Plat<strong>for</strong>m helps you strengthen the cyber resilience of your organization by not giving<br />
cybercriminals a real chance. People with malicious motivations will not be able to access your<br />
in<strong>for</strong>mation if your “cyber doors” are closed. How can you approach that in concrete terms?<br />
1. Be aware of your attack surface<br />
Only when you understand the breadth and depth of your online presence you can really evaluate the<br />
risks your organization runs. An attack surface changes and grows continuously, which makes it hard<br />
and complex to have an up-to-date overview in real time.<br />
For example, the Sweepatic Plat<strong>for</strong>m automatically and exhaustively scans the attack surface <strong>for</strong><br />
vulnerabilities or CVEs (Common Vulnerabilities and Exposures). Sweepatic verifies email security<br />
settings which will prevent fraudulent or phishing emails sent in the name of an organization. Websites<br />
are verified against a list of configuration and encryption best practices. New cloud-based applications<br />
deployed with default and insecure settings are detected within days.<br />
By keeping an eye on your attack surface, such risks can be avoided. The Sweepatic Plat<strong>for</strong>m discovers<br />
the full extent of your attack surface 24x7 and assesses in which areas you can remove targets <strong>for</strong><br />
cyberattacks. You can slim down your attack surface in three concrete ways:<br />
2. Websites and domain names<br />
Keep an up-to-date view of which hosts your organization uses and manage them efficiently. You do this<br />
by updating your configurations, keeping an eye on which web applications are running and carefully<br />
handling where exactly you store and share confidential in<strong>for</strong>mation. This provides you with an overview<br />
of which internet-facing assets - that no longer serve a business justification - to take offline or of where<br />
precisely you can improve your attack surface security.<br />
After all, what is not there, cannot be hacked.<br />
3. External providers<br />
Nowadays, not all IT passes through or is managed by the IT department, let alone IT security. Are you<br />
aware of what is put online? Do you know exactly which external providers your organization uses? Not<br />
only is it safer to limit this group, it will likely save you monthly subscription fees as well.<br />
100