01.03.2022 Views

Cyber Defense eMagazine March Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in DC, London, FL, NY and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings site being revamped); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

InDesign and uploaded to indd.adobe.com, a legitimate URL. Hosting a phishing attack in a known URL<br />

is not uncommon, but this was the first time we saw it done in InDesign. The InDesign domain also has<br />

certain characteristics that enabled the bad actors to conceal the malware; the link was hidden in an<br />

image (something that is possible in InDesign) and there<strong>for</strong>e was not identified as a URL when scanned<br />

by many security solutions. This masking technique enables attackers to avoid raising suspicions and<br />

bypass many email detection measures.<br />

This was the first time this type of technique was confirmed as a phishing attack; luckily, it was uncovered<br />

be<strong>for</strong>e causing serious damage. But, this new type of threat shows just how constant - and dangerous -<br />

the evolution of the cybersecurity landscape is. <strong>Cyber</strong> criminals are, un<strong>for</strong>tunately, usually one step<br />

ahead of their targets, and it’s critical to stay up to date on the latest techniques being used to best protect<br />

yourself and your organization. To build a strong cyber detection and prevention plan against phishing<br />

attempts, there are many steps companies can, and should take.<br />

Prepare <strong>for</strong> the worst<br />

So, what are companies or security-based solutions supposed to do when faced with a tricky challenge<br />

like this one?<br />

The first step is to ensure your organization has the most up-to-date and advanced security protections<br />

in place. Basic email security is not enough - it’s critical to have a security plat<strong>for</strong>m in place that can<br />

detect more advanced and emerging phishing techniques, especially the ones that have not yet been<br />

discovered or even developed. It’s also more important than ever that organizations adopt an assumed<br />

breach mentality: plan <strong>for</strong> when a cyber attack will happen, not if. Remote work and increased use of<br />

cloud-based SaaS plat<strong>for</strong>ms are essentially invitations to bad actors. As useful as these technologies<br />

are, it opens up gaps <strong>for</strong> malware to enter a system when you least expect it.<br />

Implementing security solutions to help with detection and prevention are important, but it’s even more<br />

necessary to develop cyber resilience in your company. A strong cybersecurity approach is one that<br />

starts with an assumed breach mentality within an organization, and ends with building a cyber resilience<br />

foundation. <strong>Cyber</strong> resilience is not a product or attitude, but rather an ongoing journey with an evolving<br />

mindset to grow as new threats and technologies continue to emerge. Together with an assumed-breach,<br />

cyber-resilient culture, your company will not only be prepared <strong>for</strong> the next vulnerability around the corner,<br />

but also will have the ability to respond and quickly recover from an adverse cyber event.<br />

In an ever-changing digital environment, security can no longer af<strong>for</strong>d to be afterthought. It is the<br />

responsibility of each organization to ensure that when a threat emerges, they are able to minimize the<br />

risk to prevent the attack from growing and wreaking havoc on themselves or others, such as their<br />

customers. It is too easy <strong>for</strong> cyber attacks to quickly spread and have a ripple effect that can impact<br />

thousands. As dangerous cyber criminals become smarter, we must too, and take the proper steps to<br />

fight back.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2022</strong> <strong>Edition</strong> 75<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!