01.10.2021 Views

Cyber Defense eMagazine October Edition for 2021

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

Cyber Defense eMagazine October Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES #CYBERSECURITYAWARENESSMONTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Eliminating discovered threats<br />

It may be difficult to provide one piece of advice here since any actions will largely depend on the<br />

assessment results. However, there are some things any team can do to mitigate the existing threats (of<br />

course in case it has the relevant talent and expertise).<br />

First, a team can use the assessment results to develop patches <strong>for</strong> the discovered vulnerabilities.<br />

Although this is not a one-size-fits-it-all solution, this way enterprises can increase the security of their<br />

software if there is no other way possible. Also, here the team should tread particularly carefully —<br />

sometimes, patches and upgrades may generate new risks and vulnerabilities; there<strong>for</strong>e, if the team isn’t<br />

sure about the positive result, it may be better to entrust this task to third-party cybersecurity experts.<br />

Second, based on the assessment, the team can develop new security policies or improve their existing<br />

ones. For example, an enterprise may implement user segmentation to limit access to the most<br />

vulnerable modules of its application. Alternatively, teams can start running regular penetration tests to<br />

be able to find and fix any threats quickly.<br />

Considering software modernization<br />

Although the above-listed measures may help with advancing security, legacy software may generate<br />

new risks and vulnerabilities anyway. There<strong>for</strong>e, enterprise managers should still consider modernizing<br />

their software; this is the only fully reliable way to ensure that the corporate infrastructure is up-to-speed<br />

and follows best cybersecurity practices. For instance, teams can renovate their app architecture, migrate<br />

solutions to a more modern and secure plat<strong>for</strong>m, transfer data to the cloud, or implement selective<br />

customizations. If more radical measures are required, teams can also consider refactoring or developing<br />

a completely new solution instead of the old one.<br />

Final thoughts<br />

For many enterprises, legacy software remains an integral part of their digital infrastructures. While<br />

outdated solutions continue to provide some value, they also pose security risks; to mitigate them, teams<br />

can conduct cybersecurity assessments and fix vulnerabilities by deploying patches and enhancing their<br />

security policies. Still, only a comprehensive application modernization may guarantee advanced and<br />

future-proof cybersecurity.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>October</strong> <strong>2021</strong> <strong>Edition</strong> 62<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!