31.05.2021 Views

Cyber Defense eMagazine June 2021 Edition

Cyber Defense eMagazine June Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The media headlines refer to these attacks as ‘data breaches’, yet the default approach to data security<br />

for all these organizations has been concentrated on protecting the network - to little effect. In many<br />

cases, these data breaches have seen malicious actors access the organization’s network, sometimes<br />

for long periods of time, and then have their choice of data that’s left exposed and vulnerable.<br />

So what’s the reasoning behind maintaining this flawed approach to data protection? The fact is that<br />

current approaches mean it is simply not possible to implement the level of security that sensitive data<br />

demands when it is in transit without compromising network performance. Facing an either/or decision,<br />

companies have blindly followed the same old path of attempting to secure the network perimeter, and<br />

hoping that they won’t be subject to the same fate as so many before them.<br />

However, consider separating data security from the network through an encryption-based information<br />

assurance overlay. This means that organizations can ensure that even when malicious actors enter the<br />

network, the data will still be unreachable and illegible, keeping the integrity, validity and confidentiality<br />

of the data intact without affecting overall performance of the underlying infrastructure.<br />

Regulations and compliance<br />

Regulations such as GDPR have caused many problems for businesses globally. There are multiple data<br />

regulations businesses must comply with, but GDPR in particular highlighted how vital it is for<br />

organizations to protect their sensitive data. In the case of GDPR, organizations are not fined based on<br />

a network breach; in fact, if a cyber hacker were to enter an organization’s network but not compromise<br />

any data, the company wouldn’t actually be in breach of the regulation at all.<br />

Regulations including GDPR and others such as HIPAA, CCPA, CJIS or PCI-DSS, are focused on<br />

protecting vulnerable data, whether it’s financial, healthcare or law enforcement data. The point is: it all<br />

revolves around data, but the way in which data needs to be secured will rely on business intent. By<br />

implementing an intent-based policy, organizations can ensure their data is being handled and secured<br />

in a way that will meet business goals and deliver provable and measurable outcomes, irrespective of<br />

how the regulatory environment might evolve over time - as it inevitably will.<br />

Preventing data breaches<br />

The growth in digitization means that there is now more data available to waiting malicious actors, and<br />

sensitive data is becoming increasingly valuable across all business sectors.<br />

To ensure the continued security of valuable, sensitive data, a change in mindset is required when it<br />

comes to any cyber security investment. A CISO must consider essential questions, for example: Will<br />

this technology protect my data as it moves throughout the network? Will this solution keep data safe,<br />

even if criminals are able to hack into the network? Will this strategy ensure the business is compliant<br />

with regulations concerning data security, and that if a network breach does occur, the business won’t<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>June</strong> <strong>2021</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!