02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

What should agencies look <strong>for</strong> in a solution?<br />

Skilled attackers are aware of the EDR capabilities and know how to get around them. If agencies pair a<br />

threat hunting solution with their EDR technologies, they will have a deeper, more<br />

comprehensive visibility over their endpoints.<br />

When looking <strong>for</strong> the right threat hunting plat<strong>for</strong>m, it is crucial that agencies keep certain criteria in mind –<br />

adaptability, scalability, and extensibility. It is also important to use a plat<strong>for</strong>m that is fully powered by<br />

accurate data and can respond to threats in seconds. Here are some elements to look <strong>for</strong> when choosing<br />

an EDR solution:<br />

‣ Continuous monitoring of endpoints. Legacy security solutions tend to employ a collection of<br />

incompatible point solutions tied together in a SIEM, resulting in a data set that is weeks old, and<br />

doesn’t include unmanaged, offline, or off-network endpoints. Instead, it is important to have<br />

a comprehensive plat<strong>for</strong>m to gather in-depth endpoint data, giving agencies the ability to collect<br />

accurate, real-time data in minutes, not months<br />

‣ Formatted, organized data. Many tools require you to export data from different sources,<br />

normalize output, then attempt to combine it all into one report. It is important <strong>for</strong> agencies to<br />

streamline this process through a solution that provides actionable data that is already in the<br />

correct <strong>for</strong>mat <strong>for</strong> use<br />

‣ Zero-trust architecture. Achieving a strong endpoint defense requires complete visibility into the<br />

entire operating environment. Agencies should look <strong>for</strong> a plat<strong>for</strong>m with a zero-trust architecture<br />

that continually monitors device health and checks whether it is patched, secure, compliant, and<br />

managed<br />

An endpoint security and management plat<strong>for</strong>m solution can dig deeper into the suspicious activity<br />

detected by EDR to understand the threat and protect any additional machines that may have been<br />

compromised. A single plat<strong>for</strong>m of this nature gathers in-depth endpoint data, giving agencies the ability<br />

to collect accurate, real-time data in minutes.<br />

The time to improve cyber is now, and everyone plays a part in this process. The federal government has<br />

set the precedent with this memo, and agencies understand the importance of the guidance. Agencies<br />

must implement a strong EDR solution and enhance their EDR capabilities to improve their security<br />

posture and response capability.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 37<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!