Cyber Defense eMagazine October Edition for 2021
Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH
Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Eliminating discovered threats<br />
It may be difficult to provide one piece of advice here since any actions will largely depend on the<br />
assessment results. However, there are some things any team can do to mitigate the existing threats (of<br />
course in case it has the relevant talent and expertise).<br />
First, a team can use the assessment results to develop patches <strong>for</strong> the discovered vulnerabilities.<br />
Although this is not a one-size-fits-it-all solution, this way enterprises can increase the security of their<br />
software if there is no other way possible. Also, here the team should tread particularly carefully —<br />
sometimes, patches and upgrades may generate new risks and vulnerabilities; there<strong>for</strong>e, if the team isn’t<br />
sure about the positive result, it may be better to entrust this task to third-party cybersecurity experts.<br />
Second, based on the assessment, the team can develop new security policies or improve their existing<br />
ones. For example, an enterprise may implement user segmentation to limit access to the most<br />
vulnerable modules of its application. Alternatively, teams can start running regular penetration tests to<br />
be able to find and fix any threats quickly.<br />
Considering software modernization<br />
Although the above-listed measures may help with advancing security, legacy software may generate<br />
new risks and vulnerabilities anyway. There<strong>for</strong>e, enterprise managers should still consider modernizing<br />
their software; this is the only fully reliable way to ensure that the corporate infrastructure is up-to-speed<br />
and follows best cybersecurity practices. For instance, teams can renovate their app architecture, migrate<br />
solutions to a more modern and secure plat<strong>for</strong>m, transfer data to the cloud, or implement selective<br />
customizations. If more radical measures are required, teams can also consider refactoring or developing<br />
a completely new solution instead of the old one.<br />
Final thoughts<br />
For many enterprises, legacy software remains an integral part of their digital infrastructures. While<br />
outdated solutions continue to provide some value, they also pose security risks; to mitigate them, teams<br />
can conduct cybersecurity assessments and fix vulnerabilities by deploying patches and enhancing their<br />
security policies. Still, only a comprehensive application modernization may guarantee advanced and<br />
future-proof cybersecurity.<br />
<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>October</strong> <strong>2021</strong> <strong>Edition</strong> 62<br />
Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.