02.11.2021 Views

Cyber Defense eMagazine November Edition for 2021

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

Cyber Defense eMagazine November Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Solving <strong>for</strong> the long run<br />

All these limitations drive the requirements <strong>for</strong> the trans<strong>for</strong>mation of network security and how in<strong>for</strong>mation<br />

security is approached altogether. Some of this trans<strong>for</strong>mation was in progress be<strong>for</strong>e the pandemic, but<br />

it accelerated rapidly out of necessity when it struck. Zero Trust is still riding the hype curve, and many<br />

fragmented point solutions exist that address specific use cases without accounting <strong>for</strong> the bigger picture.<br />

This bigger picture is the need to decouple security from the underlying network construct to avoid the<br />

traditional cybersecurity vs. networking trade-offs that either cripple network availability or the security<br />

posture.<br />

There is also a need <strong>for</strong> ubiquitous access policy management (across all domains) and simplification<br />

via automation of cybersecurity operations to accelerate detection and response times. An ideal Zero<br />

Trust Access (ZTA) plat<strong>for</strong>m should deliver full visibility about what’s flowing through the network (users,<br />

devices, apps) by integrating with existing identity providers (IDP). The solution should also provide a<br />

unified policy management plane across multiple domains that would address the need <strong>for</strong> ubiquity and<br />

agility.<br />

It’s just then, through a single pane of glass across all domains, that the never-ending Zero Trust journey<br />

to eliminate the attack surface can start. Organizations can begin by securing the crown jewels first, or<br />

by piloting Zero Trust Network Access (ZTNA) to secure access <strong>for</strong> the hybrid work<strong>for</strong>ce. Alternatively,<br />

Network Security Architects may choose to learn the ropes of Zero Trust network security by addressing<br />

the sprawl of IoT in the workplace. Whatever the most pressing use case may be, the worst they can do<br />

is to lose sight of the long game: that the same solution should address all use cases and avoid network<br />

chokepoints that prevent scalability.<br />

The ideal end game is a distributed architecture where multi-domain policies are managed centrally but<br />

distributed and en<strong>for</strong>ced as close to the resources as possible, with continuous identity verification via<br />

integration with any flavor of IDP, including those providing telemetry about health status and other<br />

contextual attributes alongside identity. By making identity, context, and behavior the new (and now<br />

dynamic) enterprise perimeter, it becomes easier to manage risk and implement a potent cyber defense<br />

system that works under the Zero Trust paradigm.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2021</strong> <strong>Edition</strong> 76<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!